|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 24 occurrences of 21 keywords
|
|
|
Results
Found 53 publication records. Showing 53 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Ermis Papastefanakis, Bruno Maitre, Dominique Ragot |
Security Challenges in ManyCore Embedded Systems based on Networks-on-Chip (NoCs). |
WESS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Pedro Malagón, Juan-Mariano de Goyeneche, David Fraga 0001, José Manuel Moya |
Bitslice software implementation of KeeLoq as a side-channel countermeasure. |
WESS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jakub Breier, Dirmanto Jap |
Testing Feasibility of Back-Side Laser Fault Injection on a Microcontroller. |
WESS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sixing Lu, Roman Lysecky |
Analysis of Control Flow Events for Timing-based Runtime Anomaly Detection. |
WESS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Christian Krieg, Daniel Neubacher |
CHEF: A Configurable Hardware Trojan Evaluation Framework. |
WESS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Stavros A. Koubias, Thilo Sauter (eds.) |
Proceedings of the 10th Workshop on Embedded Systems Security, WESS 2015, Amsterdam, The Netherlands, October 8, 2015 |
WESS |
2015 |
DBLP BibTeX RDF |
|
1 | Taimour Wehbe, Vincent John Mooney, David C. Keezer, Nicholas B. Parham |
A Novel Approach to Detect Hardware Trojan Attacks on Primary Data Inputs. |
WESS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Paula Vasile, Bogdan Groza, Pal-Stefan Murvay |
Performance analysis of broadcast authentication protocols on CAN-FD and FlexRay. |
WESS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Omaimah Omar Bamasag, Kamal Youcef-Toumi |
Towards Continuous Authentication in Internet of Things Based on Secret Sharing Scheme. |
WESS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Anju P. Johnson, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay |
A Novel Attack on a FPGA based True Random Number Generator. |
WESS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Taimoor Khan 0001, Anastasios Fragopoulos, Dimitrios N. Serpanos, Howard E. Shrobe |
Abstract Data Machine: Data Classifier for Reliable Embedded Systems Software. |
WESS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Oscar M. Guillen, Ralf Brederlow, Ralph Ledwa, Georg Sigl |
Risk management in embedded devices using metering applications as example. |
WESS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | João Amaral, Francesco Regazzoni 0001, Pedro Tomás, Ricardo Chaves |
Accelerating differential power analysis on heterogeneous systems. |
WESS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xuan Thuy Ngo, Sylvain Guilley, Shivam Bhasin, Jean-Luc Danger, Zakaria Najm |
Encoding the state of integrated circuits: a proactive and reactive protection against hardware Trojans horses. |
WESS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Aderinola Gbade-Alabi, David C. Keezer, Vincent John Mooney, Axel York Poschmann, Marc Stöttinger, Kshitij Divekar |
A signature based architecture for Trojan detection. |
WESS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Marilyn Wolf, Saibal Mukhopadhyay |
Information theoretic models for signatures in VLSI power delivery systems. |
WESS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ting Yu, Shengqi Yang (eds.) |
Proceedings of the 9th Workshop on Embedded Systems Security, WESS '14, New Delhi, India, October 17, 2014 |
WESS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bodhisatwa Mazumdar |
Some RSSB constructions with improved resistance towards differential power analysis. |
WESS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Papalambrou, Kyriakos Stefanidis, John V. Gialelis, Dimitrios N. Serpanos |
Detection, traceback and filtering of denial of service attacks in networked embedded systems. |
WESS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anju P. Johnson, Sayandeep Saha, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay, Sezer Gören 0001 |
Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernet. |
WESS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Debasri Saha, Susmita Sur-Kolay |
Trusted sharing of intellectual property in electronic hardware design. |
WESS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Aydin Aysu, Nahid Farhady Ghalaty, Zane R. Franklin, Moein Pahlavan Yali, Patrick Schaumont |
Digital fingerprints for low-cost platforms using MEMS sensors. |
WESS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Valentina Banciu, Simon Hoerder, Dan Page |
Light-weight primitive, feather-weight security: a cryptanalytic knock-out. |
WESS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Kutzner, Axel York Poschmann, Marc Stöttinger |
Hardware trojan design and detection: a practical evaluation. |
WESS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Höller, Christopher Preschern, Christian Steger, Christian Kreiner, Armin Krieg, Holger Bock, Josef Haid |
Automatized high-level evaluation of security properties for RTL hardware designs. |
WESS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Gangqiang Yang, Xinxin Fan, Mark D. Aagaard, Guang Gong |
Design space exploration of the lightweight stream cipher WG-8 for FPGAs and ASICs. |
WESS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Arash Vahidi, Christopher Jämthagen |
Secure RPC in embedded systems: evaluation of some GlobalPlatform implementation alternatives. |
WESS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the Workshop on Embedded Systems Security, WESS 2013, Montreal, Quebec, Canada, September 29 - October 4, 2013 |
WESS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm |
A low-entropy first-degree secure provable masking scheme for resource-constrained devices. |
WESS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michal Parusinski, Saloomeh Shariati, Dina Kamel, François-Xavier Standaert |
Strong PUFs and their (physical) unpredictability: a case study with power PUFs. |
WESS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Leandro Fiorin, Alberto Ferrante, Konstantinos Padarnitsas, Stefano Carucci |
Hardware-assisted security enhanced Linux in embedded systems: a proposal. |
WESS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dominik Merli, Frederic Stumpf, Claudia Eckert 0001 |
Improving the quality of ring oscillator PUFs on FPGAs. |
WESS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Slobodan Lukovic, Nikolaos Christianos |
Enhancing network-on-chip components to support security of processing elements. |
WESS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Luis Angel D. Bathen, Nikil D. Dutt |
PoliMakE: a policy making engine for secure embedded software execution on chip-multiprocessors. |
WESS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nevine Maurice Ebeid, Rob Lambert |
A new CRT-RSA algorithm resistant to powerful fault attacks. |
WESS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Szilagyi, Philip Koopman |
Low cost multicast authentication via validity voting in time-triggered embedded control networks. |
WESS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the 5th Workshop on Embedded Systems Security, WESS 2010, Scottsdale, AZ, USA, October 24, 2010 |
WESS |
2010 |
DBLP BibTeX RDF |
|
1 | Ted Huffmire, Timothy E. Levin, Michael Bilzor, Cynthia E. Irvine, Jonathan Valamehr, Mohit Tiwari, Timothy Sherwood, Ryan Kastner |
Hardware trust implications of 3-D integration. |
WESS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Barenghi, Luca Breveglieri, Israel Koren, Gerardo Pelosi, Francesco Regazzoni 0001 |
Countermeasures against fault attacks on software implemented AES: effectiveness and cost. |
WESS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Abdourhamane Idrissa, Alain Aubert, Thierry Fournel, Viktor Fischer |
Secure protocols for serverless remote product authentication. |
WESS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Edgar Mateos, Catherine H. Gebotys |
A new correlation frequency analysis of the side channel. |
WESS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ambuj Sinha, Zhimin Chen 0002, Patrick Schaumont |
A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software. |
WESS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shivam Bhasin, Sylvain Guilley, Florent Flament, Nidhal Selmane, Jean-Luc Danger |
Countering early evaluation: an approach towards robust dual-rail precharge logic. |
WESS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Antonio Vincenzo Taddeo, Pierpaolo Marcon, Alberto Ferrante |
Negotiation of security services: a multi-criteria decision approach. |
WESS |
2009 |
DBLP DOI BibTeX RDF |
cryptographic algorithm selection, security, quality of service, cryptography, adaptive systems, AHP, analytic hierarchy process, utility function |
1 | Ilya Kizhvatov |
Side channel analysis of AVR XMEGA crypto engine. |
WESS |
2009 |
DBLP DOI BibTeX RDF |
cryptography, DPA, side channel analysis |
1 | Philipp Grabher, Johann Großschädl, Dan Page |
Non-deterministic processors: FPGA-based analysis of area, performance and security. |
WESS |
2009 |
DBLP DOI BibTeX RDF |
micro-architectural countermeasures, non-deterministic processors, side-channel attack, processor design |
1 | Dimitrios N. Serpanos, Wayne H. Wolf (eds.) |
Proceedings of the 4th Workshop on Embedded Systems Security, WESS 2009, Grenoble, France, October 15, 2009 |
WESS |
2009 |
DBLP BibTeX RDF |
|
1 | Jean-Sébastien Coron, Ilya Kizhvatov |
Analysis of the split mask countermeasure for embedded systems. |
WESS |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, DPA, side channel analysis, countermeasures, masking |
1 | Thomas Winkler 0002, Bernhard Rinner |
Applications of trusted computing in pervasive smart camera networks. |
WESS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Juan Carlos Martínez Santos, Yunsi Fei, Zhijie Jerry Shi |
PIFT: efficient dynamic information flow tracking using secure page allocation. |
WESS |
2009 |
DBLP DOI BibTeX RDF |
control flow validation, security attacks, program validation |
1 | Ahmadou Al Khary Séré, Julien Iguchi-Cartigny, Jean-Louis Lanet |
Automatic detection of fault attack and countermeasures. |
WESS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jörg Brauer, Bastian Schlich, Thomas Reinbacher, Stefan Kowalewski |
Stack bounds analysis for microcontroller assembly code. |
WESS |
2009 |
DBLP DOI BibTeX RDF |
model checking, verification, static analysis, embedded software, assembly code |
1 | Miroslav Knezevic, Ingrid Verbauwhede |
Hardware evaluation of the Luffa hash family. |
WESS |
2009 |
DBLP DOI BibTeX RDF |
Luffa hash algorithm, SHA-3 competition, ASIC implementations |
Displaying result #1 - #53 of 53 (100 per page; Change: )
|
|