نتایج جستجو برای: hardware security ip protection security path

تعداد نتایج: 611393  

2016
Xiaolong Guo Raj Gautam Dutta Yier Jin

A rapidly growing third-party Intellectual Property (IP) market provides IP consumers with high flexibility when designing electronic systems. It also reduces the development time and expertise needed to compete in a market where profitwindows are very narrow. However, one key issue that has been neglected is the security of hardware designs built upon third-party IP cores. Historically, IP con...

2013
Swarup Bhunia Leyla Nazhandali

h SECURITY OF ELECTRONIC hardware at different stages of its life cycle has emerged as a paramount concern to integrated circuits (ICs) designers, system integrators, as well as to the end users. Over time, hardware components, platforms and supply chains have been considered secure and trustworthy. However, recent discoveries and reports on security vulnerabilities with attacks in microchips a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده حقوق 1389

abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1391

this research is about the political economy of china in central asia. in this research the political & economic interactions affected on chinas political economy in central asia are examined. chinas goal of presence in central asia including political-security, economic and energy goals is described in one part. in another part, the trade relations between china and central asian countries ar...

2014
Ruimin Hu Haitao Lv Jun Chen

In this paper, the protection coverage area of a security system is considered. The protection coverage is determined by applying the protection model of security systems, which is brought forward according to Neyman-Pearson Criterion. The protection model can be used to define the protection probability on a grid-modeled field. The security systems deployed in a guard field are regarded abstra...

2003
Giovanni Vigna

The TCP/IP protocol suite has been designed to provide a simple, open communication infrastructure in an academic collaborative environment. Little attention has been paid to security issues. Therefore, the TCP/IP protocols are not able to provide the authentication, integrity, and privacy mechanisms to protect communication in a hostile environment. To solve the security problem, several secur...

2018
Wei Hu Ryan Kastner

Hardware is an increasingly attractive attack surface since it controls low-level access to critical resources like cryptographic keys, personally identifiable information, and firmware. Unfortunately, it is difficult to assess the security vulnerabilities of a hardware design, which is a consequence of too few hardware security design tools and metrics. In this work, we describe important secu...

Journal: :IEEE Transactions on Emerging Topics in Computing 2021

Split manufacturing (SM) and layout camouflaging (LC) are two promising techniques to obscure integrated circuits (ICs) from malicious entities during after manufacturing. While both enable protecting the intellectual property (IP) of ICs, SM can further mitigate insertion hardware Trojans (HTs). In this paper, we strive for "best worlds," that is seek combine individual strengths LC. By jointl...

Journal: :IEEE Design & Test of Computers 2010
Mark Mohammad Tehranipoor Farinaz Koushanfar

THE EMERGENCE OF a globalized, horizontal semiconductor business model raises concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware security and trust issues span a broad spectrum of topics ranging from the malicious insertion of Trojan circuits designed to act as a silicon time bomb to d...

2009
Radu Stefan Kees Goossens

Title: Network-on-chip security using multipath routing Authors: Radu Stefan, Kees Goossens keywords: noc, multipath, security In a highly competitive consumer electronics industry, companies try to protect their IP and that of their customers from reverse-engineering attempts and sometimes they attempt to crate barriers against unauthorized use of their products in applications like Digital Ri...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید