Sensor physical unclonable functions
We propose a novel variety of sensor that extends the functionality of conventional physical
unclonable functions to provide authentication, unclonability, and verification of a sensed …
unclonable functions to provide authentication, unclonability, and verification of a sensed …
CEDA: Control-flow error detection using assertions
This paper presents an efficient software technique, control-flow error detection through
assertions (CEDA), for online detection of control-flow errors. Extra instructions are …
assertions (CEDA), for online detection of control-flow errors. Extra instructions are …
Review of fault injection mechanisms and consequences on countermeasures design
The secret keys handled by cryptographic devices can be extracted using fault attacks
associated with cryptanalysis techniques. These faults can be induced by different means …
associated with cryptanalysis techniques. These faults can be induced by different means …
Control-flow checking using branch instructions
M Jafari-Nodoushan, SG Miremadi… - 2008 IEEE/IFIP …, 2008 - ieeexplore.ieee.org
This paper presents a hardware control-flow checking scheme for RISC processor-based
systems. This scheme combines two error detection mechanisms to provide high coverage …
systems. This scheme combines two error detection mechanisms to provide high coverage …
Architectural frameworks for security and reliability of MPSoCs
K Patel, S Parameswaran… - IEEE transactions on very …, 2010 - ieeexplore.ieee.org
Multiprocessor system-on-chip (MPSoC) architectures are increasingly used in modern
embedded systems. MPSoCs are used for confidential and critical applications and hence …
embedded systems. MPSoCs are used for confidential and critical applications and hence …
FEDC: Control Flow Error Detection and Correction for embedded systems without program interruption
This paper proposes a new technique called CFEDC to detect and correct control flow errors
(CFEs) without program interruption. The proposed technique is based on the modification …
(CFEs) without program interruption. The proposed technique is based on the modification …
Path sensitive signatures for control flow error detection
Transistors' performance has been improving by shrinking feature sizes, lowering voltage
levels, and reducing noise margins. However, these changes also make transistors more …
levels, and reducing noise margins. However, these changes also make transistors more …
Tree-based microaggregation for the anonymization of search logs
When considering the publishing of web search query logs, there is an important trade-off
between the privacy and the usefulness of the data. This paper introduces a novel approach …
between the privacy and the usefulness of the data. This paper introduces a novel approach …
Strategic information systems planning with box structures
AR Hevner, DJ Bernt, J Studnicki - Proceedings of the 33rd …, 2000 - ieeexplore.ieee.org
Strategic information systems planning (SISP) is the process of aligning an organization's
business strategy with effective computer based information systems to achieve critical …
business strategy with effective computer based information systems to achieve critical …