Refine Search

New Search

Results in Journal Journal of Hardware and Systems Security: 128

(searched for: journal_id:(1461936))
Page of 3
Articles per Page
by
Show export options
  Select all
, Alison Hosey, Zimu Guo, Jackson Carroll, Domenic Forte, Mark Tehranipoor
Published: 1 June 2017
Journal of Hardware and Systems Security, Volume 1, pp 137-155; https://doi.org/10.1007/s41635-017-0012-3

The publisher has not yet granted permission to display this abstract.
, Wei He, Shivam Bhasin, Dirmanto Jap, Samuel Chef, Hock Guan Ong, Chee Lip Gan
Published: 1 September 2017
Journal of Hardware and Systems Security, Volume 1, pp 237-251; https://doi.org/10.1007/s41635-017-0016-z

The publisher has not yet granted permission to display this abstract.
, Benjamin Carrion Schafer
Published: 1 June 2017
Journal of Hardware and Systems Security, Volume 1, pp 103-113; https://doi.org/10.1007/s41635-017-0014-1

The publisher has not yet granted permission to display this abstract.
Published: 1 June 2017
Journal of Hardware and Systems Security, Volume 1, pp 156-172; https://doi.org/10.1007/s41635-017-0011-4

The publisher has not yet granted permission to display this abstract.
, Sourya Kakarla, Srinath Mandava, Dipanwita Roy Chowdhury
Published: 1 August 2017
Journal of Hardware and Systems Security, Volume 1, pp 282-296; https://doi.org/10.1007/s41635-017-0010-5

The publisher has not yet granted permission to display this abstract.
, Dean Michael Ancajas, Koushik Chakraborty, Sanghamitra Roy
Published: 30 May 2017
Journal of Hardware and Systems Security, Volume 1, pp 173-187; https://doi.org/10.1007/s41635-017-0008-z

The publisher has not yet granted permission to display this abstract.
, Korosh Vatanparvar, Atul Prasad Deb Nath, Shuo Yang, Swarup Bhunia, Mohammad Abdullah Al Faruque
Published: 10 May 2017
Journal of Hardware and Systems Security, Volume 1, pp 188-199; https://doi.org/10.1007/s41635-017-0007-0

The publisher has not yet granted permission to display this abstract.
, , Debdeep Mukhopadhyay
Published: 1 March 2017
Journal of Hardware and Systems Security, Volume 1, pp 3-17; https://doi.org/10.1007/s41635-017-0006-1

The publisher has not yet granted permission to display this abstract.
, Prabhat Mishra
Published: 1 March 2017
Journal of Hardware and Systems Security, Volume 1, pp 68-84; https://doi.org/10.1007/s41635-017-0004-3

The publisher has not yet granted permission to display this abstract.
, Benjamin Carrion Schafer
Published: 1 March 2017
Journal of Hardware and Systems Security, Volume 1, pp 56-67; https://doi.org/10.1007/s41635-017-0005-2

The publisher has not yet granted permission to display this abstract.
, Miao Tony He, Hassan Salmani, Domenic Forte, Swarup Bhunia, Mark Tehranipoor
Published: 1 March 2017
Journal of Hardware and Systems Security, Volume 1, pp 85-102; https://doi.org/10.1007/s41635-017-0001-6

The publisher has not yet granted permission to display this abstract.
, Mike Borza, Brian Rosenberg, Charles Qi
Published: 1 March 2017
Journal of Hardware and Systems Security, Volume 1, pp 38-55; https://doi.org/10.1007/s41635-017-0002-5

The publisher has not yet granted permission to display this abstract.
, Andrew Kacmarcik, Milos Prvulovic, Alenka Zajić
Published: 28 June 2022
Journal of Hardware and Systems Security pp 1-15; https://doi.org/10.1007/s41635-022-00127-7

The publisher has not yet granted permission to display this abstract.
Published: 21 March 2022
Journal of Hardware and Systems Security pp 1-16; https://doi.org/10.1007/s41635-022-00124-w

The publisher has not yet granted permission to display this abstract.
, Ali Shuja Siddiqui, Sam Reji Joseph, Gregory Williams,
Published: 29 November 2021
Journal of Hardware and Systems Security pp 1-9; https://doi.org/10.1007/s41635-021-00123-3

The publisher has not yet granted permission to display this abstract.
, Zimu Guo, Fatemeh Ganji, Nima Karimian, Damon Woodard, Domenic Forte
Published: 25 October 2021
Journal of Hardware and Systems Security, Volume 5, pp 223-236; https://doi.org/10.1007/s41635-021-00121-5

The publisher has not yet granted permission to display this abstract.
, Frank T. Werner, Milos Prvulovic, Alenka Zajić
Published: 5 June 2021
Journal of Hardware and Systems Security, Volume 5, pp 114-126; https://doi.org/10.1007/s41635-021-00116-2

The publisher has not yet granted permission to display this abstract.
Published: 30 April 2021
Journal of Hardware and Systems Security pp 1-11; https://doi.org/10.1007/s41635-021-00114-4

Abstract:
New services such as autonomous driving, the connectivity of the traffic infrastructure and the tight coupling of user operated smart devices with the vehicle have significantly increased the demand for cryptographic protection in the automobile. To provide a secure environment for the calculation and verification of cryptographic material, automotive microcontrollers now frequently integrate Hardware Security Modules (HSM), special well-protected co-processors, which are protected against manipulation and external access. HSMs use special hardware accelerators to provide the required cryptographic services. While these accelerators provide good performance, they limit flexibility and updatability. In addition, as more services require cryptographic protection, the amount of key material that needs to be managed by the HSM also increases, turning the limited protected memory of the HSM into a bottleneck. This paper presents a framework that uses the safety mechanisms of a microcontroller to achieve both HSM-equivalent security through software solutions, while providing an equivalent level of functionality. Furthermore, the proposed framework provides crypto-agility, as the security stack can be updated if desired. In order to verify the functionality, the presented framework is implemented and evaluated on an Infineon AURIX TC399 and compared with the integrated HSM.
, Xiao Zhang, Jiebin Su, Zhixin Zhou, Hongyin Luo, Donghui Guo
Published: 19 January 2021
Journal of Hardware and Systems Security, Volume 5, pp 32-44; https://doi.org/10.1007/s41635-020-00109-7

The publisher has not yet granted permission to display this abstract.
Published: 16 October 2020
Journal of Hardware and Systems Security, Volume 4, pp 314-328; https://doi.org/10.1007/s41635-020-00106-w

Abstract:
Profiling attacks, especially those based on machine learning, proved to be very successful techniques in recent years when considering the side-channel analysis of symmetric-key crypto implementations. At the same time, the results for implementations of asymmetric-key cryptosystems are very sparse. This paper considers several machine learning techniques to mount side-channel attacks on two implementations of scalar multiplication on the elliptic curve Curve25519. The first implementation follows the baseline implementation with complete formulae as used for EdDSA in WolfSSl, where we exploit power consumption as a side-channel. The second implementation features several countermeasures, and in this case, we analyze electromagnetic emanations to find side-channel leakage. Most techniques considered in this work result in potent attacks, and especially the method of choice appears to be convolutional neural networks (CNNs), which can break the first implementation with only a single measurement in the attack phase. The same convolutional neural network demonstrated excellent performance for attacking AES cipher implementations. Our results show that some common grounds can be established when using deep learning for profiling attacks on very different cryptographic algorithms and their corresponding implementations.
Published: 8 October 2020
Journal of Hardware and Systems Security, Volume 4, pp 277-296; https://doi.org/10.1007/s41635-020-00103-z

The publisher has not yet granted permission to display this abstract.
, Leonardo Aniello,
Published: 4 September 2020
Journal of Hardware and Systems Security, Volume 5, pp 1-18; https://doi.org/10.1007/s41635-020-00102-0

Abstract:
The Internet of Things technology is expected to generate tremendous economic benefits; this promise is undermined by major security threats. This is mainly due to the ubiquitous nature of this technology, which makes it easy for potential adversities to have access to IoT devices and carry well-established attacks. The development of defence mechanisms, in this case, is a challenging task; this is due to the fact that most IoT devices have limited computing and energy resources, which makes it hard to implement classic cryptographic algorithms. This paper addresses this challenge by proposing a lightweight mutual authentication and key agreement protocol named ASSURE based on Rivest Cipher (RC5) and physically unclonable functions (PUFs). To understand the effectiveness of this protocol, a rigorous security analysis under various cyber-attack scenarios is performed. In order to evaluate the overheads of the proposed solution, a wireless sensor network using typical IoT devices called Zolertia Zoul re-mote is constructed. The functionality of the proposed scheme is verified using a server-client configuration. Then, energy consumption and memory utilization are estimated and compared with the existing solutions, namely, the DTLS (datagram transport layer security) handshake protocol in pre-shared secret (key) mode and UDP (user datagram protocol). Experimental analysis results indicate that the proposed protocol can save up to 39.5% energy and uses 14% less memory compared with the DTLS handshake protocol.
Published: 30 August 2020
Journal of Hardware and Systems Security, Volume 4, pp 263-276; https://doi.org/10.1007/s41635-020-00099-6

The publisher has not yet granted permission to display this abstract.
, Kyle Juretus, Nagarajan Kandasamy, Ioannis Savidis, Kapil R. Dandekar
Published: 23 July 2020
Journal of Hardware and Systems Security, Volume 4, pp 230-245; https://doi.org/10.1007/s41635-020-00097-8

The publisher has not yet granted permission to display this abstract.
Published: 2 July 2020
Journal of Hardware and Systems Security, Volume 4, pp 208-229; https://doi.org/10.1007/s41635-020-00098-7

The publisher has not yet granted permission to display this abstract.
, Sai Santosh Dayapule, , Milos Doroslovacki, Guru Venkataramani
Published: 7 June 2020
Journal of Hardware and Systems Security, Volume 4, pp 180-195; https://doi.org/10.1007/s41635-020-00095-w

The publisher has not yet granted permission to display this abstract.
Page of 3
Articles per Page
by
Show export options
  Select all
Back to Top Top