Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An overview of hardware security and trust: Threats, countermeasures, and design tools
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics
The increasing prevalence of Internet of Things (IoT) devices has made it inevitable that their
pertinence to digital forensic investigations will increase into the foreseeable future. These …
pertinence to digital forensic investigations will increase into the foreseeable future. These …
Screaming channels: When electromagnetic side channels meet radio transceivers
This paper presents a new side channel that affects mixed-signal chips used in widespread
wireless communication protocols, such as Bluetooth and WiFi. This increasingly common …
wireless communication protocols, such as Bluetooth and WiFi. This increasingly common …
Preventing page faults from telling your secrets
New hardware primitives such as Intel SGX secure a user-level process in presence of an
untrusted or compromised OS. Such" enclaved execution" systems are vulnerable to several …
untrusted or compromised OS. Such" enclaved execution" systems are vulnerable to several …
Bitwhisper: Covert signaling channel between air-gapped computers using thermal manipulations
It has been assumed that the physical separation ('air-gap') of computers provides a reliable
level of security, such that should two adjacent computers become compromised, the covert …
level of security, such that should two adjacent computers become compromised, the covert …
{GSMem}: Data exfiltration from {Air-Gapped} computers over {GSM} frequencies
M Guri, A Kachlon, O Hasson, G Kedma… - 24th USENIX Security …, 2015 - usenix.org
Air-gapped networks are isolated, separated both logically and physically from public
networks. Although the feasibility of invading such systems has been demonstrated in recent …
networks. Although the feasibility of invading such systems has been demonstrated in recent …
USBee: Air-gap covert-channel via electromagnetic emission from USB
In recent years researchers have demonstrated how attackers could use USB connectors
implanted with RF transmitters to exfiltrate data from secure, and even air-gapped …
implanted with RF transmitters to exfiltrate data from secure, and even air-gapped …
SoK: Design tools for side-channel-aware implementations
Side-channel attacks that leak sensitive information through a computing device's interaction
with its physical environment have proven to be a severe threat to devices' security …
with its physical environment have proven to be a severe threat to devices' security …
[HTML][HTML] Leveraging electromagnetic side-channel analysis for the investigation of IoT devices
Abstract Internet of Things (IoT) devices have expanded the horizon of digital forensic
investigations by providing a rich set of new evidence sources. IoT devices includes health …
investigations by providing a rich set of new evidence sources. IoT devices includes health …
Design of an intelligent management system for agricultural greenhouses based on the internet of things
Z Li, J Wang, R Higgs, L Zhou… - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
China is a large agricultural country with the largest population in the world. This creates a
high demand for food, which is prompting the study of high quality and high-yielding crops …
high demand for food, which is prompting the study of high quality and high-yielding crops …