Security and performance in IoT: A balancing act

LE Kane, JJ Chen, R Thomas, V Liu, M Mckague - IEEE access, 2020 - ieeexplore.ieee.org
With predictions suggesting there will be 18 billion Internet of Things (IoT) devices live by
2022, performance of these low powered devices, as well as security is of utmost …

Data security utilizing a memristive coupled neural network in 3D models

M Gabr, A Diab, HT Elshoush, YL Chen, LY Por… - IEEE …, 2024 - ieeexplore.ieee.org
This article proposes a novel double data security algorithm that first encrypts sensitive data
using a two-stage encryption method based on numerical solutions from a fractional-order …

Quantifiable assurance: from IPs to platforms

B Ahmed, MK Bepary, N Pundir, M Borza… - arxiv preprint arxiv …, 2022 - arxiv.org
Hardware vulnerabilities are generally considered more difficult to fix than software ones
because they are persistent after fabrication. Thus, it is crucial to assess the security and fix …

Skin detection and lightweight encryption for privacy protection in real-time surveillance applications

A Shifa, MB Imtiaz, MN Asghar, M Fleury - Image and Vision Computing, 2020 - Elsevier
An individual's privacy is a significant concern in surveillance videos. Existing research work
into the location of individuals on the basis of detecting their skin is focused either on …

EETD: An energy efficient design for runtime hardware trojan detection in untrusted network-on-chip

M Hussain, A Malekpour, H Guo… - 2018 IEEE Computer …, 2018 - ieeexplore.ieee.org
Network-on-chip (NoC) is a communication intellectual property (IP) core, popularly used in
the system-on-a-chip (SoC) designs. The NoC IP core often comes from an untrusted 3rd …

Specifying a principle of cryptographic justice as a response to the problem of going dark

M Wilson - Ethics and Information Technology, 2023 - Springer
Over the past decade, the Five Eyes Intelligence community has argued cryptosystems with
end-to-end encryption (E2EE) are disrupting the acquisition and analysis of digital evidence …

RFTC: Runtime frequency tuning countermeasure using FPGA dynamic reconfiguration to mitigate power analysis attacks

D Jayasinghe, A Ignjatovic… - Proceedings of the 56th …, 2019 - dl.acm.org
Random execution time-based countermeasures against power analysis attacks have
reduced resource overheads when compared to balancing power dissipation and masking …

FPGA based countermeasures against side channel attacks on block ciphers

D Jayasinghe, B Udugama… - … of the 28th Asia and South …, 2023 - dl.acm.org
Field Programmable Gate Arrays (FPGAs) are increasingly ubiquitous. FPGAs enable
hardware acceleration and reconfigurability. Any security breach or attack on critical …

Sentry-NoC: A statically-scheduled NoC for secure SoCs

A Shalaby, Y Tavva, TE Carlson, LS Peh - Proceedings of the 15th IEEE …, 2021 - dl.acm.org
SoC security has become essential with devices now pervasive in critical infrastructure in
homes and businesses. Today's embedded SoCs are becoming increasingly high …

Uclod: Small clock delays to mitigate remote power analysis attacks

D Jayasinghe, A Ignjatovic, S Parameswaran - IEEE Access, 2021 - ieeexplore.ieee.org
This paper presents UCloD, a novel random clock delay-based robust and scalable
countermeasure against recently discovered remote power analysis (RPA) attacks. UCloD …