Academic literature on the topic 'Hardware Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hardware Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Hardware Security"
Polian, Ilia. "Hardware-oriented security." it - Information Technology 61, no. 1 (February 25, 2019): 1–2. http://dx.doi.org/10.1515/itit-2019-0008.
Full textHunter, Philip. "Hardware-based security." Computer Fraud & Security 2004, no. 2 (February 2004): 11–12. http://dx.doi.org/10.1016/s1361-3723(04)00029-6.
Full textSengupta, Anirban. "Hardware Security of CE Devices [Hardware Matters]." IEEE Consumer Electronics Magazine 6, no. 1 (January 2017): 130–33. http://dx.doi.org/10.1109/mce.2016.2614552.
Full textJin, Yier. "Introduction to Hardware Security." Electronics 4, no. 4 (October 13, 2015): 763–84. http://dx.doi.org/10.3390/electronics4040763.
Full textKoushanfar, Farinaz, and Miodrag Potkonjak. "What is hardware security?" ACM SIGDA Newsletter 40, no. 9 (September 2010): 1. http://dx.doi.org/10.1145/1866978.1866979.
Full textFox, Dirk. "Hardware Security Module (HSM)." Datenschutz und Datensicherheit - DuD 33, no. 9 (September 2009): 564. http://dx.doi.org/10.1007/s11623-009-0145-9.
Full textGuin, Ujjwal, Navid Asadizanjani, and Mark Tehranipoor. "Standards for Hardware Security." GetMobile: Mobile Computing and Communications 23, no. 1 (July 24, 2019): 5–9. http://dx.doi.org/10.1145/3351422.3351424.
Full textSidhu, Simranjeet, Bassam J. Mohd, and Thaier Hayajneh. "Hardware Security in IoT Devices with Emphasis on Hardware Trojans." Journal of Sensor and Actuator Networks 8, no. 3 (August 10, 2019): 42. http://dx.doi.org/10.3390/jsan8030042.
Full textAdlkofer, Hans. "Safety and Security Need Hardware." ATZelectronics worldwide 16, no. 10 (October 2021): 66. http://dx.doi.org/10.1007/s38314-021-0699-3.
Full textD.S, Suresh, and V. Udayashankara. "External Hardware Security for Steganography." i-manager's Journal on Future Engineering and Technology 2, no. 2 (January 15, 2007): 17–22. http://dx.doi.org/10.26634/jfet.2.2.874.
Full textDissertations / Theses on the topic "Hardware Security"
Kalibjian, Jeff. "Securing Telemetry Post Processing Applications with Hardware Based Security." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605052.
Full textThe use of hardware security for telemetry in satellites utilized for intelligence and defense applications is well known. Less common is the use of hardware security in ground-based computers hosting applications that post process telemetry data. Analysis reveals vulnerabilities in software only security solutions that can result in the compromise of telemetry data housed on ground-based computer systems. Such systems maybe made less susceptible to compromise with the use of hardware based security.
Chakraborty, Rajat Subhra. "Hardware Security through Design Obfuscation." Cleveland, Ohio : Case Western Reserve University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=case1270133481.
Full textDepartment of EECS - Computer Engineering Title from PDF (viewed on 2010-05-25) Includes abstract Includes bibliographical references and appendices Available online via the OhioLINK ETD Center
Tselekounis, Ioannis. "Cryptographic techniques for hardware security." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/33148.
Full textEdmison, Joshua Nathaniel. "Hardware Architectures for Software Security." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/29244.
Full textPh. D.
Leonhard, Julian. "Analog hardware security and trust." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS246.
Full textThe ongoing globalization and specialization of the integrated circuit (IC) supply chain has led semiconductor companies to share their valuable intellectual property (IP) assets with numerous parties for means of manufacturing, testing, etc. As a consequence, sensitive IPs and ICs are being exposed to untrusted parties, resulting in serious piracy threats such as counterfeiting or reverse engineering. In this thesis we develop methods to secure analog and mixed signal IPs/ICs from piracy threats within the supply chain. We propose an anti-piracy methodology for locking mixed-signal ICs via logic locking of their digital part. Furthermore, we propose an anti-reverse engineering methodology camouflaging the effective geometry of layout components. Finally, we propose an attack to break all analog circuit locking techniques that act upon the biasing of the circuit. The presented techniques have the potential to protect analog and mixed-signal circuits against a large subset of all the possible risk scenarios while inflicting low overheads in terms of area, power and performance
Bilzor, Michael B. "Defining and enforcing hardware security requirements." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10741.
Full textSekar, Sanjana. "Logic Encryption Methods for Hardware Security." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1505124923353686.
Full textXue, Hao. "Hardware Security and VLSI Design Optimization." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1546466777397815.
Full textValea, Emanuele. "Security Techniques for Test Infrastructures." Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS042.
Full textTest infrastructures are crucial to the modern Integrated Circuits (ICs) industry. The necessity of detecting manufacturing defects and preventing system failures in the field, makes their presence inevitable in every IC and its sub-modules. Unfortunately, test infrastructures also represent a security threat due to the augmented controllability and observability on the IC internals that they typically provide. In this thesis, we present a comprehensive analysis of the existing threats and the respective countermeasures, also providing a classification and a taxonomy of the state-of-the-art. Furthermore, we propose new security solutions, based on lightweight cryptography, for the design of test infrastructures. All proposed countermeasures belong to the category of scan encryption solutions and their purpose is to guarantee data confidentiality and user authentication. Each proposed solution is evaluated in terms of implementation costs and security capabilities. The works that have been carried out and are presented in this thesis, indicate that scan encryption is a promising solution for granting a secure design of test infrastructures
Wenhua, Qi, Zhang Qishan, and Liu Hailong. "RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606688.
Full textSecurity hardware based on asymmetric algorithm is the key component of Public Key Infrastructure (PKI), which decides the safety and performance of system. Security device in server or client have some common functions. We designed the client token and cryptographic server to improve the performance of PKI, and got obvious effect.
Books on the topic "Hardware Security"
Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. Hardware Security Primitives. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-19185-5.
Full textSadeghi, Ahmad-Reza, and David Naccache, eds. Towards Hardware-Intrinsic Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14452-3.
Full textSklavos, Nicolas, Ricardo Chaves, Giorgio Di Natale, and Francesco Regazzoni, eds. Hardware Security and Trust. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-44318-8.
Full textHalak, Basel, ed. Hardware Supply Chain Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62707-2.
Full textFarahmandi, Farimah, M. Sazadur Rahman, Sree Ranjani Rajendran, and Mark Tehranipoor. CAD for Hardware Security. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-26896-0.
Full textTehranipoor, Mark, ed. Emerging Topics in Hardware Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-64448-2.
Full textKatkoori, Srinivas, and Sheikh Ariful Islam, eds. Behavioral Synthesis for Hardware Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-78841-4.
Full textMishra, Prabhat, Swarup Bhunia, and Mark Tehranipoor, eds. Hardware IP Security and Trust. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49025-0.
Full textTehranipoor, Mark, N. Nalla Anandakumar, and Farimah Farahmandi. Hardware Security Training, Hands-on! Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-31034-8.
Full textKelly, Wayne. Security hardware and security system planning for museums. Ottawa, Ont: Canadian Conservation Institute, 1998.
Find full textBook chapters on the topic "Hardware Security"
Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Analog Security." In Hardware Security Primitives, 245–60. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_14.
Full textSommerhalder, Maria. "Hardware Security Module." In Trends in Data Protection and Encryption Technologies, 83–87. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_16.
Full textHuffmire, Ted, Cynthia Irvine, Thuy D. Nguyen, Timothy Levin, Ryan Kastner, and Timothy Sherwood. "Hardware Security Challenges." In Handbook of FPGA Design Security, 71–85. Dordrecht: Springer Netherlands, 2010. http://dx.doi.org/10.1007/978-90-481-9157-4_3.
Full textMavrovouniotis, Stathis, and Mick Ganley. "Hardware Security Modules." In Secure Smart Embedded Devices, Platforms and Applications, 383–405. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7915-4_17.
Full textTuyls, Pim. "Hardware Intrinsic Security." In Radio Frequency Identification: Security and Privacy Issues, 123. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16822-2_11.
Full textSustek, Laurent. "Hardware Security Module." In Encyclopedia of Cryptography and Security, 535–38. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_509.
Full textBertino, Elisa, Sonam Bhardwaj, Fabrizio Cicala, Sishuai Gong, Imtiaz Karim, Charalampos Katsis, Hyunwoo Lee, Adrian Shuai Li, and Ashraf Y. Mahgoub. "Hardware Security Analysis." In Synthesis Lectures on Information Security, Privacy, and Trust, 71–77. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-28259-1_5.
Full textDöttling, Nico, Daniel Kraschewski, Jörn Müller-Quade, and Tobias Nilges. "From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions." In Provable Security, 23–42. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26059-4_2.
Full textTehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Intrinsic Racetrack PUF." In Hardware Security Primitives, 1–16. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_1.
Full textTehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Fault Injection Resistant Cryptographic Hardware." In Hardware Security Primitives, 333–46. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_19.
Full textConference papers on the topic "Hardware Security"
Sadeghi, Ahmad-Reza. "Hardware-Assisted Security." In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3139324.3139326.
Full textLeef, Serge. "Hardware cyber security." In the 2014. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2560519.2565868.
Full textChandra, Vikas, and Rob Aitken. "Mobile hardware security." In 2014 IEEE Hot Chips 26 Symposium (HCS). IEEE, 2014. http://dx.doi.org/10.1109/hotchips.2014.7478796.
Full textLee, Ruby, Simha Sethumadhavan, and G. Edward Suh. "Hardware enhanced security." In the 2012 ACM conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2382196.2382323.
Full textBurleson, Wayne, and Yusuf Leblebici. "Hardware security in VLSI." In the 21st edition of the great lakes symposium. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1973009.1973109.
Full textTsvetanov, Filip. "Sensor network hardware security." In THE 9TH INTERNATIONAL CONFERENCE OF THE INDONESIAN CHEMICAL SOCIETY ICICS 2021: Toward a Meaningful Society. AIP Publishing, 2022. http://dx.doi.org/10.1063/5.0099518.
Full textGu, Jie, and Carlos Tokunaga. "Session details: Hardware Security." In ISLPED '16: International Symposium on Low Power Electronics and Design. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/3256017.
Full textChan, Philip, Thomas Barnett, Abdel-Hameed Badawy, and Patrick W. Jungwirth. "Cyber defense through hardware security." In Disruptive Technologies in Information Sciences, edited by Misty Blowers, Russell D. Hall, and Venkateswara R. Dasari. SPIE, 2018. http://dx.doi.org/10.1117/12.2302805.
Full text"2.2 Special session: Hardware security." In 2014 International Conference on Field-Programmable Technology (FPT). IEEE, 2014. http://dx.doi.org/10.1109/fpt.2014.7082767.
Full textLo, Dan Chia-Tien, Kai Qian, and Wei Chen. "Hardware Attacks and Security Education." In 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2016. http://dx.doi.org/10.1109/compsac.2016.128.
Full textReports on the topic "Hardware Security"
Souppaya, Murugiah. Hardware-Enabled Security:. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8320b.
Full textSouppaya, Murugiah. Hardware-Enabled Security:. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8320.
Full textBartock, Michael. Hardware Enabled Security:. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8320c.ipd.
Full textBartock, Michael. Hardware Enabled Security:. Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.ir.8320d.ipd.
Full textBartock, Michael. Hardware Enabled Security:. Gaithersburg, MD: National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8320d.
Full textMell, Peter. Hardware Security Failure Scenarios:. Gaithersburg, MD: National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8517.ipd.
Full textBartock, Michael, Murugiah Souppaya, Jerry Wheeler, Tim Knoll, Uttam Shetty, Ryan Savino, Joseprabu Inbaraj, Stefano Righi, and Karen Scarfone. Hardware-Enabled Security: Container Platform Security Prototype. National Institute of Standards and Technology, June 2021. http://dx.doi.org/10.6028/nist.ir.8320a.
Full textNguyen, Thuy D., Timothy E. Levin, Cynthia E. Irvin, Terry V. Benzel, and Ganesha Bhaskara. Preliminary Security Requirements for SecureCore Hardware. Fort Belvoir, VA: Defense Technical Information Center, September 2006. http://dx.doi.org/10.21236/ada457517.
Full textKastner, Ryan, and Ted Huffmire. Threats and Challenges in Reconfigurable Hardware Security. Fort Belvoir, VA: Defense Technical Information Center, July 2008. http://dx.doi.org/10.21236/ada511928.
Full textRushby, John. Formally Verified Hardware Encapsulation Mechanism for Security, Integrity, and Safety. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada403303.
Full text