19 results on '"Hardware obfuscation"'
Search Results
2. Smart Systems: Innovations in Computing : Proceedings of SSIC 2023
- Author
-
Arun K. Somani, Ankit Mundra, Rohit Kumar Gupta, Subhajit Bhattacharya, Arka Prokash Mazumdar, Arun K. Somani, Ankit Mundra, Rohit Kumar Gupta, Subhajit Bhattacharya, and Arka Prokash Mazumdar
- Subjects
- Computational intelligence, Artificial intelligence, Internet of things, Data protection
- Abstract
The book features original papers from the 4th International Conference on Smart IoT Systems: Innovations in Computing (SSIC 2023), organized by Manipal University, Jaipur, India during 26 – 27 October 2023. It discusses scientific works related to data engineering in context of computational collective intelligence consisted of interaction between smart devices for smart environments and interactions. Thanks to the high-quality content and the broad range of the topics covered, the book appeals to researchers pursuing advanced studies.
- Published
- 2024
3. E-Business and Telecommunications : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, Revised Selected Papers
- Author
-
Pierangela Samarati, Marten van Sinderen, Sabrina De Capitani di Vimercati, Fons Wijnhoven, Pierangela Samarati, Marten van Sinderen, Sabrina De Capitani di Vimercati, and Fons Wijnhoven
- Subjects
- Computer networks, Application software, Data protection, Computer networks—Security measures, Cryptography, Data encryption (Computer science), Computer systems
- Abstract
The present book includes extended and revised versions of a set of selected papers presented at the 18th International Joint Conference on e-Business and Telecommunications, ICETE 2021, held as an online web-based event (due to the COVID-19 pandemic) in July 2021.The 17 full papers included in this book were carefully reviewed and selected from 197 submissions. They were organized in topical sections as follows: e-Business and security and cryptography.
- Published
- 2023
4. Security of Internet of Things Nodes : Challenges, Attacks, and Countermeasures
- Author
-
Chinmay Chakraborty, Sree Ranjani Rajendran, Muhammad Habibur Rehman, Chinmay Chakraborty, Sree Ranjani Rajendran, and Muhammad Habibur Rehman
- Subjects
- Internet of things--Security measures
- Abstract
The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures® covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things. It also covers various algorithms, techniques, and schemes in the field of computer science with state-of-the-art tools and technologies. This book mainly focuses on the security challenges of the Internet of Things devices and the countermeasures to overcome security vulnerabilities. Also, it highlights trust management issues on the Internet of Things nodes to build secured Internet of Things systems. The book also covers the necessity of a system model for the Internet of Things devices to ensure security at the hardware level.
- Published
- 2021
5. Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)
- Author
-
Kuan-Ching Li, Brij B. Gupta, Dharma P. Agrawal, Kuan-Ching Li, Brij B. Gupta, and Dharma P. Agrawal
- Subjects
- Cooperating objects (Computer systems)--Security measures, Internet of things--Security measures
- Abstract
Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Analysis of cyber-attack vectors and the provision of appropriate mitigation techniques are essential research areas for these systems. Adoption of best practices and maintaining a balance between ease of use and security are, again, crucial for the effective performance of these systems.Recent Advances in Security, Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) discusses and presents techniques and methodologies, as well as a wide range of examples and illustrations, to effectively show the principles, algorithms, challenges, and applications of security, privacy, and trust for IoT and CPS.Book features: Introduces new directions for research, development, and engineering security, privacy, and trust of IoT and CPS Includes a wealth of examples and illustrations to effectively demonstrate the principles, algorithms, challenges, and applications Covers most of the important security aspects and current trends not present in other reference books This book will also serve as an excellent reference in security, privacy, and trust of IoT and CPS for professionals in this fast-evolving and critical field. The chapters present high-quality contributions from researchers, academics, and practitioners from various national and international organizations and universities.
- Published
- 2021
6. Cryptographic Obfuscation : A Survey
- Author
-
Máté Horváth, Levente Buttyán, Máté Horváth, and Levente Buttyán
- Subjects
- Cryptography, Data encryption (Computer science), Data protection
- Abstract
This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference for researchers in cryptography and theoretical computer science.
- Published
- 2020
7. Information Security and Optimization
- Author
-
Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta, Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, and Sunil Gupta
- Subjects
- Data encryption (Computer science), Mathematical optimization, Information technology--Security measures, Computer security
- Abstract
Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools—definitions, usage, and analysis—that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies.Features: A wide range of case studies and examples derived from real-life scenarios that map theoretical explanations with real incidents. Descriptions of security tools related to digital forensics with their unique features, and the working steps for acquiring hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presentation of real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that is important because of extensive use of cloud services to meet organizational and research demands such as data storage and computing requirements. Information Security and Optimization is equally helpful for undergraduate and postgraduate students as well as for researchers working in the domain. It can be recommended as a reference or textbook for courses related to cybersecurity.
- Published
- 2020
8. Industrial Control Systems Security and Resiliency : Practice and Theory
- Author
-
Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney, Craig Rieger, Indrajit Ray, Quanyan Zhu, and Michael A. Haney
- Subjects
- Data protection, Computer networks, Telecommunication, Artificial intelligence
- Abstract
This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios.Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Suchresilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission's survivability goals, and identify ways to design secure resilient ICS systems.This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.
- Published
- 2019
9. VLSI Design and Test : 23rd International Symposium, VDAT 2019, Indore, India, July 4–6, 2019, Revised Selected Papers
- Author
-
Anirban Sengupta, Sudeb Dasgupta, Virendra Singh, Rohit Sharma, Santosh Kumar Vishvakarma, Anirban Sengupta, Sudeb Dasgupta, Virendra Singh, Rohit Sharma, and Santosh Kumar Vishvakarma
- Subjects
- Computers, Computer engineering, Computer networks, Artificial intelligence, Data protection, Computer vision, Machine theory
- Abstract
This book constitutes the refereed proceedings of the 23st International Symposium on VLSI Design and Test, VDAT 2019, held in Indore, India, in July 2019. The 63 full papers were carefully reviewed and selected from 199 submissions. The papers are organized in topical sections named: analog and mixed signal design; computing architecture and security; hardware design and optimization; low power VLSI and memory design; device modelling; and hardware implementation.
- Published
- 2019
10. Cryptographic Security Solutions for the Internet of Things
- Author
-
Mohammad Tariq Banday and Mohammad Tariq Banday
- Subjects
- Internet of things--Security measures, Cryptography
- Abstract
The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks. Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.
- Published
- 2019
11. Hardware Security : A Hands-on Learning Approach
- Author
-
Swarup Bhunia, Mark M. Tehranipoor, Swarup Bhunia, and Mark M. Tehranipoor
- Abstract
Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is ideal as a textbook for upper-level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals. For academic courses, the book contains a robust suite of teaching ancillaries. Users will be able to access schematic, layout and design files for a printed circuit board for hardware hacking (i.e. the HaHa board) that can be used by instructors to fabricate boards, a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials. Provides a thorough overview of computer hardware, including the fundamentals of computer systems and the implications of security risks Includes discussion of the liability, safety and privacy implications of hardware and software security and interaction Gives insights on a wide range of security, trust issues and emerging attacks and protection mechanisms in the electronic hardware lifecycle, from design, fabrication, test, and distribution, straight through to supply chain and deployment in the field A full range of instructor and student support materials can be found on the authors'own website for the book: http://hwsecuritybook.org
- Published
- 2018
12. Cyber Defence in Industry 4.0 Systems and Related Logistics and IT Infrastructures
- Author
-
Dimitrov, Konstantin, IOS Press, Dimitrov, Konstantin, and IOS Press
- Subjects
- Computer security--Congresses, Computer networks--Security measures--Congresses
- Abstract
Industry and government are increasingly reliant on an intelligent – or ‘smart'– and interconnected computer infrastructure, but the reality is that it is extremely difficult to provide full cyber defense and/or intrusion prevention for the smart networks that connect intelligent industrial and logistics modules, since the more intelligent the systems are, the more vulnerable they become. This book presents papers from the NATO Advanced Research Workshop (ARW) on Cyber Defence in Industry 4.0 Systems and Related Logistics and IT Infrastructures, held in Jyvaskyla, Finland, in October 2017. The main focus of the 11 papers included here is the creation and implementation of cyber systems and cyber platforms capable of providing enhanced cyber security and interoperability for smart IT infrastructure. Topics covered include: smart intrusion prevention; adaptive cyber defense; smart recovery of systems; and the smart monitoring, control and management of Industry 4.0 complexes and related logistics systems such as robotic equipment, logistics modules, units and technologic equipment, as well as their IT infrastructure.
- Published
- 2018
13. The Hardware Trojan War : Attacks, Myths, and Defenses
- Author
-
Swarup Bhunia, Mark M. Tehranipoor, Swarup Bhunia, and Mark M. Tehranipoor
- Subjects
- Microelectronics, Electronics, Electronic circuits, Computer software--Reusability, Engineering, Data encryption (Computer science), Computer security
- Abstract
This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches – both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.
- Published
- 2018
14. Hardware IP Security and Trust
- Author
-
Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor, Prabhat Mishra, Swarup Bhunia, and Mark Tehranipoor
- Subjects
- Electronics, Systems engineering, Computer networks--Security measures, Internet Protocol multimedia subsystem
- Abstract
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.
- Published
- 2017
15. Cryptographic Hardware and Embedded Systems – CHES 2016 : 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings
- Author
-
Benedikt Gierlichs, Axel Y. Poschmann, Benedikt Gierlichs, and Axel Y. Poschmann
- Subjects
- Computer networks, Cryptography, Data encryption (Computer science), Electronic data processing—Management, Computers, Data protection, Artificial intelligence
- Abstract
This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2016, held in Santa Barbara, CA, USA, in August 2016. The 30 full papers presented in this volume were carefully reviewed and selected from 148 submissions. They were organized in topical sections named: side channel analysis; automotive security; invasive attacks; side channel countermeasures; new directions; software implementations; cache attacks; physical unclonable functions; hardware implementations; and fault attacks.
- Published
- 2016
16. Secure System Design and Trustable Computing
- Author
-
Chip-Hong Chang, Miodrag Potkonjak, Chip-Hong Chang, and Miodrag Potkonjak
- Subjects
- Data encryption (Computer science), Embedded computer systems--Security measures, Computer security
- Abstract
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system applications, online transactions and networking services. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of and trust in, modern society's microelectronic-supported infrastructures.
- Published
- 2016
17. Hardware Security : Design, Threats, and Safeguards
- Author
-
Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay, and Rajat Subhra Chakraborty
- Subjects
- QA76.9.A25
- Abstract
Design for security and meet real-time requirements with this must-have book covering basic theory, hardware design and implementation of cryptographic algorithms, and side channel analysis. Presenting state-of-the-art research and strategies for the design of very large scale integrated circuits and symmetric cryptosystems, the text discusses hardware intellectual property protection, obfuscation and physically unclonable functions, Trojan threats, and algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis. Gain a comprehensive understanding of hardware security from fundamentals to practical applications.
- Published
- 2014
18. Advances in Cryptology -- ASIACRYPT 2011 : 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011, Proceedings
- Author
-
Dong Hoon Lee, Xiaoyun Wang, Dong Hoon Lee, and Xiaoyun Wang
- Subjects
- Computer security--Congresses, Cryptography--Congresses
- Abstract
This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011. The 40 revised papers included in this volume were carefully reviewed and selected from 266 submissions. The contributions are organized in topical sections on lattices and quantum cryptography; public key encryption; database privacy; hash function; symmetric key encryption; zero knowledge proof; universal composability; foundation; secure computation and secret sharing; public key signature; and leakage resilient cryptography.
- Published
- 2011
19. Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
- Author
-
R.R. Brooks and R.R. Brooks
- Subjects
- Peer-to-peer architecture (Computer networks), Computer networks--Security measures, Computer viruses, Disruptive technologies
- Abstract
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities explo
- Published
- 2005
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.