نتایج جستجو برای: hardware security ip protection security path
تعداد نتایج: 611393 فیلتر نتایج به سال:
This paper describes the security mechanisms for IP version 4 (IPv4) and IP version 6 (IPv6) and the services that they provide. An overview of key management requirements for systems implementing those security mechanisms will also be discussed. There are two specific headers that are used to provide security services in IPv4 and IPv6. These headers are the IP Authentication Header (AH) and th...
Abstract Recently, the issue of malicious circuit alteration and attack draws more attention than ever before due to globalization IC design manufacturing. Malicious circuits, also known as hardware Trojans, are found able degrade performance or even leak confidential information, accordingly it is definitely an immediate concern develop detection techniques against Trojans. This paper presents...
A rapidly growing third-party intellectual property (IP) market provides IP consumers with more options for designing electronic systems. It also reduces the development time and expertise needed to compete in a market where profit windows are very narrow. However, one key issue that has been neglected is the security of electronic systems built upon third-party IP cores. Historically, IP consu...
| An in-depth analysis of the 80x86 processor families identi es architectural properties that may have unexpected, and undesirable, results in secure computer systems. In addition, reported implementation errors in some processor versions render them undesirable for secure systems because of potential security and reliability problems. In this paper, we discuss the imbalance in scrutiny for ha...
Control-Flow Integrity (CFI), as a means to prevent control-flow hijacking attacks, enforces that each instruction transfers control to an address in a set of valid targets. The security guarantee of CFI thus depends on the definition of valid targets, which conventionally are defined as the result of a static analysis. Unfortunately, previous research has demonstrated that such a definition, a...
Computer security aims at protecting confidentiality, integrity, and availability of sensitive information that are processed, used, or stored by computing systems. Computer scientists working in the field of computer security have successfully designed and developed software and hardware mechanisms to provide security in modern day computing devices. As compared to hardware security mechanisms...
Malicious modification of hardware in untrusted fabrication facilities, referred to as hardware Trojan, has emerged as a major security concern. Comprehensive detection of these Trojans during postmanufacturing test has been shown to be extremely difficult. Hence, it is important to develop design techniques that provide effective countermeasures against hardware Trojans by either preventing Tr...
This work introduces a novel content protection security framework within the virtual Set-Top Box (vSTB) concept. This concept presents a fundamental change in the creation and delivery of media services such as IP Television, by shifting most of the STB’s service execution environment to a network infrastructure. This shift enables a so-called cloud-based rendering of the User Interface and th...
IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید