Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Side-channel attacks: Ten years after its publication and the impacts on cryptographic module security testing
YB Zhou, DG Feng - Cryptology ePrint Archive, 2005 - eprint.iacr.org
Side-channel attacks are easy-to-implement whilst powerful attacks against cryptographic
implementations, and their targets range from primitives, protocols, modules, and devices to …
implementations, and their targets range from primitives, protocols, modules, and devices to …
C-FLAT: control-flow attestation for embedded systems software
Remote attestation is a crucial security service particularly relevant to increasingly popular
IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a …
IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a …
[KSIĄŻKA][B] Embedded system design: embedded systems foundations of cyber-physical systems, and the internet of things
P Marwedel - 2021 - library.oapen.org
A unique feature of this open access textbook is to provide a comprehensive introduction to
the fundamental knowledge in embedded systems, with applications in cyber-physical …
the fundamental knowledge in embedded systems, with applications in cyber-physical …
Cyber-physical systems security: a systematic map** study
Cyber-physical systems are integrations of computation, networking, and physical
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
New cache designs for thwarting software cache-based side channel attacks
Z Wang, RB Lee - Proceedings of the 34th annual international …, 2007 - dl.acm.org
Software cache-based side channel attacks are a serious new class of threats for computers.
Unlike physical side channel attacks that mostly target embedded cryptographic devices …
Unlike physical side channel attacks that mostly target embedded cryptographic devices …
Embedded systems security: Threats, vulnerabilities, and attack taxonomy
Embedded systems are the driving force for technological development in many domains
such as automotive, healthcare, and industrial control in the emerging post-PC era. As more …
such as automotive, healthcare, and industrial control in the emerging post-PC era. As more …
Proposed security model and threat taxonomy for the Internet of Things (IoT)
IoT is an intelligent collaboration of tiny sensors and devices giving new challenges to
security and privacy in end to end communication of things. Protection of data and privacy of …
security and privacy in end to end communication of things. Protection of data and privacy of …
Security in embedded systems: Design challenges
S Ravi, A Raghunathan, P Kocher… - ACM Transactions on …, 2004 - dl.acm.org
Many modern electronic systems---including personal computers, PDAs, cell phones,
network routers, smart cards, and networked sensors to name a few---need to access, store …
network routers, smart cards, and networked sensors to name a few---need to access, store …
Security aspects of the in-vehicle network in the connected car
In this paper, we briefly survey the research with respect to the security of the connected car,
and in particular its in-vehicle network. The aim is to highlight the current state of the …
and in particular its in-vehicle network. The aim is to highlight the current state of the …
[KSIĄŻKA][B] On-chip communication architectures: system on chip interconnect
S Pasricha, N Dutt - 2010 - books.google.com
Over the past decade, system-on-chip (SoC) designs have evolved to address the ever
increasing complexity of applications, fueled by the era of digital convergence …
increasing complexity of applications, fueled by the era of digital convergence …