全部 |
  • 全部
  • 题名
  • 关键词
  • NSTL主题词
  • 摘要
  • 会议名称
  • 论文-出处
  • 论文-作者
  • 论文-机构
  • 论文-DOI
  • 会议-出版者
  • 会议-出版地
  • 会议-主编
  • 会议-主办单位
  • 会议-举办地
  • ISSN
  • EISSN
  • ISBN
  • EISBN
检索 搜索会议录 二次检索 AI检索
外文文献 中文文献
筛选条件:

1. CoDPoC IP: A Configurable Data Protection Circuit to Support Multiple Key Agreement Scheme NSTL国家科技图书文献中心

Yijing Peng |  Junhui Wang... -  《Information and Communications Security,Part II》 -  International Conference on Information and Communications Security - 2025, - 151~170 - 共20页

摘要: security protocols are effective in mitigating various |  security threats, including eavesdropping, interception | : 1) hardware-level implementation incorporates PUF |  security; and 2) the IP supports flexible configuration |  hardware execution time is 0.03504 milliseconds. The
关键词: Configurable circuit |  PUF |  Key agreement scheme |  Hardware security |  IoT

2. ROBoost: A Study of FPGA Logic-Based Power-Wasting Primitives NSTL国家科技图书文献中心

Dina G. Mahmoud |  Simone Andreani... -  《Applied Reconfigurable Computing》 -  International Symposium on Applied Reconfigurable Computing - 2025, - 88~105 - 共18页

摘要: cloud FPGAs being remotely accessible, security is a | Heterogeneous computing systems increasingly |  leverage FPGAs in the cloud and embedded use cases. With |  critical concern. Recent studies show adversaries can |  exploit FPGA logic to create and remotely deploy
关键词: FPGAs |  Remote attacks |  Voltage drop |  Hardware security

3. iVault: Architectural Code Concealing Techniques to Protect Cryptographic Keys NSTL国家科技图书文献中心

George Christou |  Giorgos Vasiliadis... -  《Embedded Computer Systems: Architectures,Modeling,and Simulation,Part II》 -  International Conference on Embedded Computer Systems - 2025, - 152~164 - 共13页

摘要:Memory corruption bugs remain a significant |  concern in applications developed using memory-unsafe |  languages, such as C/C++. Adversaries can exploit these |  bugs and perform arbitrary read and write operations | . These arbitrary reads can target cryptographic keys
关键词: Hardware assisted security |  Key management

4. The study on the circuit architecture of reconfigurable physics-based unclonable technology NSTL国家科技图书文献中心

Baigen He |  Ganggang Qiu -  《Fifth International Conference on Signal Processing and Computer Science (SPCS 2024)》 -  International Conference on Signal Processing and Computer Science - 2025, - 134421D.1~134421D.8 - 共8页

摘要: information security has become increasingly prominent |  implementation, is a high-security technology that differs from |  advantages including high security, strong resistance to |  widespread application in the field of information security | . Information security refers to the protection and
关键词: Reconfigurable physical unclonable technology |  Circuit architecture |  Hardware information security

5. ELITE: Efficient and Secure Machine Learning for Intelligent Perception in Smart Road Infrastructure NSTL国家科技图书文献中心

Swathi Kumar Vembu |  Trupil Limbasiya... -  《Security and Privacy in Social Networks and Big Data》 -  Security and Privacy in Social Networks and Big Data - 2025, - 89~106 - 共18页

摘要:) equipped with a Hardware Security Module (HSM) and the |  approach enhancing security and computational efficiency |  enhanced security. Experimental results show that ELITE |  approach balances security and efficiency, mitigating | In the realm of Connected and Autonomous
关键词: Deep neural networks |  Connected and autonomous vehicles |  Trusted execution environment |  Privacy-Preserving machine learning

6. A Neural Network-Based PUF Protection Method Against Machine Learning Attack NSTL国家科技图书文献中心

Haolin Jiang |  Chenxi Zhu... -  《Algorithms and Architectures for Parallel Processing,Part IV》 -  International Conference on Algorithms and Architectures for Parallel Processing - 2025, - 100~113 - 共14页

摘要: and malicious hijacking. As an emerging hardware |  security primitive, physical unclonable function (PUF |  hardware in AIoT devices and proposes a neural network | With the rapid development of Artificial |  Intelligence & Internet of Things (AIoT), billions of
关键词: PUF |  Neural network |  Authentication |  Modeling attack

7. WBP: Training-Time Backdoor Attacks Through Hardware-Based Weight Bit Poisoning NSTL国家科技图书文献中心

Kunbei Cai |  Zhenkai Zhang... -  《Computer Vision - ECCV 2024,Part LXV》 -  European Conference on Computer Vision - 2025, - 179~197 - 共19页

摘要: deployment. Recent studies on hardware security have |  inducing hardware-based weight bit flips. WBP utilizes a | Training from pre-trained models (PTM) is a |  popular approach for fast machine learning (ML) service |  revealed that ML systems could be compromised through
关键词: Task-agnostic backdoor attack |  Pre-trained models |  Training |  Bitflip attack |  Rowhammer

8. Comparison Between In-Core Hardware IDS, Off-Core Hardware IDS and Software IDS NSTL国家科技图书文献中心

Tianxu Li |  Mohamed El-Bouazzati... -  《Design and Architectures for Signal and Image Processing》 -  International Workshop on Design and Architecture for Signal and Image Processing - 2025, - 108~120 - 共13页

摘要: Things (IoT) pose challenges to its security. To |  counter this threat, in-depth security mechanisms such |  hardware, and off-core hardware are defined and compared |  consumption per packet (+0.19mJ/p) than the hardware |  approach. Conversely, the hardware approach incurs a
关键词: Embedded system security |  Intrusion detection system |  Internet of things |  Wireless security

9. FirmPorter: Porting RTOSes at the Binary Level for Firmware Re-hosting NSTL国家科技图书文献中心

Mingfeng Xin |  Hui Wen... -  《Information and Communications Security,Part II》 -  International Conference on Information and Communications Security - 2025, - 310~331 - 共22页

摘要: (RTOS) into focus as major targets for both security | -standard hardware and diverse software, embedded RTOS |  devices present unique challenges to security analysts |  diversity in hardware components and tight coupling |  between firmware and hardware makes it hard to perform
关键词: Firmware |  Re-hosting |  Dynamic analysis |  Vulnerability assessment

10. S-RFUP: Secure Remote Firmware Update Protocol NSTL国家科技图书文献中心

Rakesh Podder |  Tyler Rios... -  《Information Systems Security》 -  International Conference on Information Systems Security - 2025, - 42~62 - 共21页

摘要: mechanisms lack security features. As a result, OTA |  sector, have started incorporating rudimentary security |  hardware device and/or associated operating system, or a |  updates that enhances security and operational integrity |  build upon the hardware root of trust functionality
关键词: PLDM |  MCTP |  Project cerberus |  Firmware update |  Hardware root of trust (HRoT)
检索条件Hardware security
  • 检索词扩展

NSTL主题词

  • NSTL学科导航