Academic literature on the topic 'Hardware Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hardware Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Hardware Security"

1

Polian, Ilia. "Hardware-oriented security." it - Information Technology 61, no. 1 (2019): 1–2. http://dx.doi.org/10.1515/itit-2019-0008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hunter, Philip. "Hardware-based security." Computer Fraud & Security 2004, no. 2 (2004): 11–12. http://dx.doi.org/10.1016/s1361-3723(04)00029-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sengupta, Anirban. "Hardware Security of CE Devices [Hardware Matters]." IEEE Consumer Electronics Magazine 6, no. 1 (2017): 130–33. http://dx.doi.org/10.1109/mce.2016.2614552.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jin, Yier. "Introduction to Hardware Security." Electronics 4, no. 4 (2015): 763–84. http://dx.doi.org/10.3390/electronics4040763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Koushanfar, Farinaz, and Miodrag Potkonjak. "What is hardware security?" ACM SIGDA Newsletter 40, no. 9 (2010): 1. http://dx.doi.org/10.1145/1866978.1866979.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fox, Dirk. "Hardware Security Module (HSM)." Datenschutz und Datensicherheit - DuD 33, no. 9 (2009): 564. http://dx.doi.org/10.1007/s11623-009-0145-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Guin, Ujjwal, Navid Asadizanjani, and Mark Tehranipoor. "Standards for Hardware Security." GetMobile: Mobile Computing and Communications 23, no. 1 (2019): 5–9. http://dx.doi.org/10.1145/3351422.3351424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Qin, Maoyuan, Jiale Li, Jiaqi Yan, Zishuai Hao, Wei Hu, and Baolong Liu. "HT-PGFV: Security-Aware Hardware Trojan Security Property Generation and Formal Security Verification Scheme." Electronics 13, no. 21 (2024): 4286. http://dx.doi.org/10.3390/electronics13214286.

Full text
Abstract:
Property-driven hardware verification provides a promising way to uncover design vulnerabilities. However, developing security properties that check for highly concealed security vulnerabilities remains a significant challenge. In this paper, we propose a scheme, called HT-PGFV, to implement hardware Trojan security property assertion automatic generation and formal security verification for Trojan-infected designs. In our scheme, we develop a hardware Trojan security property assertion generation method for automated hardware which can extract hardware Trojan security properties from Trojan-i
APA, Harvard, Vancouver, ISO, and other styles
9

Sidhu, Simranjeet, Bassam J. Mohd, and Thaier Hayajneh. "Hardware Security in IoT Devices with Emphasis on Hardware Trojans." Journal of Sensor and Actuator Networks 8, no. 3 (2019): 42. http://dx.doi.org/10.3390/jsan8030042.

Full text
Abstract:
Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software, network, and cloud security. A deeper understanding of hardware Trojans (HTs) and protection against them is of utmost importance right now as they are the prime threat to the hardware. This paper emphasizes the need for a secure hardware-level foundation for security of these devices, as depending on software security alone is not adequate enough.
APA, Harvard, Vancouver, ISO, and other styles
10

Adlkofer, Hans. "Safety and Security Need Hardware." ATZelectronics worldwide 16, no. 10 (2021): 66. http://dx.doi.org/10.1007/s38314-021-0699-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Hardware Security"

1

Kalibjian, Jeff. "Securing Telemetry Post Processing Applications with Hardware Based Security." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605052.

Full text
Abstract:
International Telemetering Conference Proceedings / October 18-21, 2004 / Town & Country Resort, San Diego, California<br>The use of hardware security for telemetry in satellites utilized for intelligence and defense applications is well known. Less common is the use of hardware security in ground-based computers hosting applications that post process telemetry data. Analysis reveals vulnerabilities in software only security solutions that can result in the compromise of telemetry data housed on ground-based computer systems. Such systems maybe made less susceptible to compromise with the use
APA, Harvard, Vancouver, ISO, and other styles
2

Chakraborty, Rajat Subhra. "Hardware Security through Design Obfuscation." Cleveland, Ohio : Case Western Reserve University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=case1270133481.

Full text
Abstract:
Thesis (Doctor of Philosophy)--Case Western Reserve University, 2010<br>Department of EECS - Computer Engineering Title from PDF (viewed on 2010-05-25) Includes abstract Includes bibliographical references and appendices Available online via the OhioLINK ETD Center
APA, Harvard, Vancouver, ISO, and other styles
3

Tselekounis, Ioannis. "Cryptographic techniques for hardware security." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/33148.

Full text
Abstract:
Traditionally, cryptographic algorithms are designed under the so-called black-box model, which considers adversaries that receive black-box access to the hardware implementation. Although a "black-box" treatment covers a wide range of attacks, it fails to capture reality adequately, as real-world adversaries can exploit physical properties of the implementation, mounting attacks that enable unexpected, non-black-box access, to the components of the cryptographic system. This type of attacks is widely known as physical attacks, and has proven to be a significant threat to the real-world securi
APA, Harvard, Vancouver, ISO, and other styles
4

Edmison, Joshua Nathaniel. "Hardware Architectures for Software Security." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/29244.

Full text
Abstract:
The need for hardware-based software protection stems primarily from the increasing value of software coupled with the inability to trust software that utilizes or manages shared resources. By correctly utilizing security functions in hardware, trust can be removed from software. Existing hardware-based software protection solutions generally suffer from utilization of trusted software, lack of implementation, and/or extreme measures such as processor redesign. In contrast, the research outlined in this document proposes that substantial, hardware-based software protection can be achieved,
APA, Harvard, Vancouver, ISO, and other styles
5

Leonhard, Julian. "Analog hardware security and trust." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS246.

Full text
Abstract:
La mondialisation et la spécialisation de la chaîne d'approvisionnement des circuits intégrés (CI) ont conduit les entreprises de semi-conducteurs à partager leur précieuse propriété intellectuelle (PI) avec de nombreuses parties pour les faire fabriquer, tester, etc. En conséquence, les PI et les CI sensibles sont exposés à des parties potentiellement malveillantes, ce qui entraîne de graves menaces de piratage telles que la contrefaçon ou la retro ingénierie. Dans cette thèse, nous développons des méthodes pour sécuriser les IP/CI analogiques et mixtes contre les menaces de piratage dans la
APA, Harvard, Vancouver, ISO, and other styles
6

Bilzor, Michael B. "Defining and enforcing hardware security requirements." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10741.

Full text
Abstract:
Security in computing systems to date has focused mostly on software. In this research, we explore the application and enforceability of well-defined security requirements in hardware designs. The principal threats to hardware systems demonstrated in the academic literature to date involve some type of subversion, often called a Hardware Trojan or malicious inclusion. Detecting these has proved very difficult. We demonstrate a method whereby the dynamic enforcement of a processor's security requirements can be used to detect the presence of some of these malicious inclusions. Although ther
APA, Harvard, Vancouver, ISO, and other styles
7

Sekar, Sanjana. "Logic Encryption Methods for Hardware Security." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1505124923353686.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xue, Hao. "Hardware Security and VLSI Design Optimization." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1546466777397815.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Valea, Emanuele. "Security Techniques for Test Infrastructures." Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS042.

Full text
Abstract:
Les infrastructures de test sont essentielles pour l'industrie moderne des circuits intégrés. La nécessité de détecter les défauts de fabrication et de prévenir les défaillances des systèmes sur le terrain, rend leur présence inévitable dans chaque circuit intégré et ses sous-modules. Malheureusement, les infrastructures de test représentent également une menace pour la sécurité en raison de la contrôlabilité et de l'observabilité accrues qu'elles offrent généralement sur les circuits internes. Dans cette thèse, nous présentons une analyse complète des menaces existantes et des contre-mesures
APA, Harvard, Vancouver, ISO, and other styles
10

Wenhua, Qi, Zhang Qishan, and Liu Hailong. "RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606688.

Full text
Abstract:
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada<br>Security hardware based on asymmetric algorithm is the key component of Public Key Infrastructure (PKI), which decides the safety and performance of system. Security device in server or client have some common functions. We designed the client token and cryptographic server to improve the performance of PKI, and got obvious effect.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Hardware Security"

1

Tehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. Hardware Security Primitives. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-19185-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sadeghi, Ahmad-Reza, and David Naccache, eds. Towards Hardware-Intrinsic Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14452-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sklavos, Nicolas, Ricardo Chaves, Giorgio Di Natale, and Francesco Regazzoni, eds. Hardware Security and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-44318-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Halak, Basel, ed. Hardware Supply Chain Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62707-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Farahmandi, Farimah, M. Sazadur Rahman, Sree Ranjani Rajendran, and Mark Tehranipoor. CAD for Hardware Security. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-26896-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tehranipoor, Mark, ed. Emerging Topics in Hardware Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-64448-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Katkoori, Srinivas, and Sheikh Ariful Islam, eds. Behavioral Synthesis for Hardware Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-78841-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mishra, Prabhat, Swarup Bhunia, and Mark Tehranipoor, eds. Hardware IP Security and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49025-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tehranipoor, Mark, N. Nalla Anandakumar, and Farimah Farahmandi. Hardware Security Training, Hands-on! Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-31034-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Hardware Security"

1

Tehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "Secure Physical Design." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "Secure Heterogeneous Integration." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "Digital Twin for Secure Semiconductor Lifecycle Management." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "Quantifiable Assurance in Hardware." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "Materials for Hardware Security." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "Large Language Models for SoC Security." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "Rethinking Hardware Watermark." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "Runtime SoC Security Validation." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "SoC Security Verification Using Fuzz, Penetration, and AI Testing." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "Advances in Logic Locking." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Hardware Security"

1

Khan, Mansoor, Muhammad Ilyas, and Oguz Bayat. "Enhancing IoT Security Through Hardware Security Modules (HSMs)." In 2024 International Conference on Intelligent Computing, Communication, Networking and Services (ICCNS). IEEE, 2024. https://doi.org/10.1109/iccns62192.2024.10776375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Afsharmazayejani, Raheel, Mohammad Moradi Shahmiri, Parker Link, Hammond Pearce, and Benjamin Tan. "Toward Hardware Security Benchmarking of LLMs." In 2024 IEEE LLM Aided Design Workshop (LAD). IEEE, 2024. http://dx.doi.org/10.1109/lad62341.2024.10691745.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sarma, Nilotpola, E. Bhawani Eswar Reddy, and Chandan Karfa. "Security Concerns of Machine Learning Hardware." In 2024 IEEE 33rd Asian Test Symposium (ATS). IEEE, 2024. https://doi.org/10.1109/ats64447.2024.10915390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mulcahy, Patrick, Michael Nowatkowski, Jeffrey Morris, and Josefa Guerrero Millan. "Developing a Framework for Hardware Security." In SoutheastCon 2025. IEEE, 2025. https://doi.org/10.1109/southeastcon56624.2025.10971450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

You, Myoungsung, Jaehyun Nam, Hyunmin Seo, et al. "HardWhale: A Hardware-Isolated Network Security Enforcement System for Cloud Environments." In 2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2024. http://dx.doi.org/10.1109/icdcs60910.2024.00053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sadeghi, Ahmad-Reza. "Hardware-Assisted Security." In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017. http://dx.doi.org/10.1145/3139324.3139326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Leef, Serge. "Hardware cyber security." In the 2014. ACM Press, 2014. http://dx.doi.org/10.1145/2560519.2565868.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chandra, Vikas, and Rob Aitken. "Mobile hardware security." In 2014 IEEE Hot Chips 26 Symposium (HCS). IEEE, 2014. http://dx.doi.org/10.1109/hotchips.2014.7478796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lee, Ruby, Simha Sethumadhavan, and G. Edward Suh. "Hardware enhanced security." In the 2012 ACM conference. ACM Press, 2012. http://dx.doi.org/10.1145/2382196.2382323.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Burleson, Wayne, and Yusuf Leblebici. "Hardware security in VLSI." In the 21st edition of the great lakes symposium. ACM Press, 2011. http://dx.doi.org/10.1145/1973009.1973109.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Hardware Security"

1

Souppaya, Murugiah. Hardware-Enabled Security:. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8320b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Souppaya, Murugiah. Hardware-Enabled Security:. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bartock, Michael. Hardware Enabled Security:. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8320c.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bartock, Michael. Hardware Enabled Security:. National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.ir.8320d.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bartock, Michael. Hardware Enabled Security:. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8320d.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mell, Peter. Hardware Security Failure Scenarios:. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8517.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mell, Peter. Hardware Security Failure Scenarios:. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8517.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bartock, Michael, Murugiah Souppaya, Jerry Wheeler, et al. Hardware-Enabled Security: Container Platform Security Prototype. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8320a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nguyen, Thuy D., Timothy E. Levin, Cynthia E. Irvin, Terry V. Benzel, and Ganesha Bhaskara. Preliminary Security Requirements for SecureCore Hardware. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada457517.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kastner, Ryan, and Ted Huffmire. Threats and Challenges in Reconfigurable Hardware Security. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada511928.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!