Eternal-Thing 2.0: Analog-Trojan-Resilient Ripple-Less Solar Harvesting System for Sustainable IoT

SK Ram, SR Sahoo, BB Das, K Mahapatra… - ACM Journal on …, 2023 - dl.acm.org
Recently, harvesting natural energy is gaining more attention than other conventional
approaches for sustainable IoT. System on chip power requirement for the internet of things …

FaultDetective: Explainable to a Fault, from the Design Layout to the Software

Z Liu, D Shanmugam… - IACR Transactions on …, 2024 - philosophymindscience.org
Hardware faults are a known source of security vulnerabilities. Fault injection in secure
embedded systems leads to information leakage and privilege escalation, and countless …

Achieving Security and Privacy via Encrypted Architectures

L Biernacki - 2023 - deepblue.lib.umich.edu
There are increasing incidences of high-profile data breaches and clever new attacks that
exploit weaknesses throughout the software stack, with recent attacks moving into the …

Способ количественного сравнения обфусцирующих преобразований

ПД Борисов, ЮВ Косолапов - Информатика и автоматизация, 2024 - mathnet.ru
В работе рассматривается задача количественного сравнения эффективности и
стойкости практически применяемых обфусцирующих преобразований программного …

[PDF][PDF] Explainable to a Fault, from the Design Layout to the Software

Z Liu, D Shanmugam, P Schaumont - tosc.iacr.org
Hardware faults are a known source of security vulnerabilities. Fault injection in secure
embedded systems leads to information leakage and privilege escalation, and countless …