Top Picks in Hardware and Embedded Security

نویسندگان

چکیده

The idea to publish a special issue on hardware and embedded security stems from workshop with the same name where previously published conference journal papers were presented. here present extended adjusted versions of these works fit under this common umbrella. My thanks goes Prof. Ramesh Karri NYU who had discussed me back in 2019. Thanks his continued efforts ideas, became reality. I also wish thank Guest Editors, Rosario Cammarota Francesco Regazzoni, have managed grouped ten into five categories: “microarchitectural side- covert-channel analysis,” “end-to-end defense lines security,” “security IP protection techniques for IC ML,” “physical side-channel “cryptographic hardware.” General Interest section contains three articles.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Top Picks, Columnists, and Artists

.......Welcome to the 2012 Top Picks issue of IEEE Micro, featuring the best papers published at top Microrelated conferences in 2011. We moved Top Picks to the third issue of 2012 to allow more time for consideration of papers published late in 2011, such as at the Micro conference. Guest Editors Paolo Faraboschi and T.N. Vijaykumar have done an outstanding job in all facets of putting togethe...

متن کامل

Ten Years of Top Picks

.......This issue marks our tenth anniversary edition of Top Picks articles from the major microarchitecture-related conferences, a tradition started in 2003 by Pradip Bose at the start of his tenure as Editor in Chief, and an issue that I think has only grown in importance in the intervening years. Over the years, Top Picks published many great articles. This year’s edition contains 11 more, a...

متن کامل

Hardware Security Modules for Embedded Systems

Being able to trust another IT system that “it always acts as expected” requires consecutive trust into all layers, which are involved in creating a trustworthy IT system. Figure 1 depicts the “pyramid of trust” for a typical IT system, where trust into the whole IT system requires that each layer can rely on the effective security of its underlying layer without being able to verify it directl...

متن کامل

Top Picks from the 2012 Computer Architecture

......In recent years, information technology (IT) has been witnessing major transformations placing unprecedented demands on efficient processing, communication, and storage of data. These transformations are driven by both the slowdown in energy efficiency in modern circuits and fabrication technologies and by the emergence of ‘‘big data’’ requiring not only higher efficiency in manipulating ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE design & test

سال: 2021

ISSN: ['2168-2364', '2168-2356']

DOI: https://doi.org/10.1109/mdat.2021.3077859