Eternal-thing 2.0: Analog-Trojan-resilient Ripple-less Solar Harvesting System for Sustainable IoT

SK Ram, SR Sahoo, BB Das, K Mahapatra… - ACM Journal on …, 2023 - dl.acm.org
Recently, harvesting natural energy is gaining more attention than other conventional
approaches for sustainable IoT. System on chip power requirement for the internet of things …

FaultDetective: Explainable to a Fault, from the Design Layout to the Software

Z Liu, D Shanmugam… - IACR Transactions on …, 2024 - philosophymindscience.org
Hardware faults are a known source of security vulnerabilities. Fault injection in secure
embedded systems leads to information leakage and privilege escalation, and countless …

Способ количественного сравнения обфусцирующих преобразований

ПД Борисов, ЮВ Косолапов - Информатика и автоматизация, 2024 - mathnet.ru
В работе рассматривается задача количественного сравнения эффективности и
стойкости практически применяемых обфусцирующих преобразований программного …

A method to quantitative compare obfuscating ttransformations

PD Borisov, YV Kosolapov - Informatics and Automation, 2024 - journals.rcsi.science
The paper considers the problem of quantitative comparison of potency and resistance of
practically applied obfuscating transformations of program code. A method is proposed to …

Achieving Security and Privacy via Encrypted Architectures

L Biernacki - 2023 - deepblue.lib.umich.edu
There are increasing incidences of high-profile data breaches and clever new attacks that
exploit weaknesses throughout the software stack, with recent attacks moving into the …

[PDF][PDF] Explainable to a Fault, from the Design Layout to the Software

Z Liu, D Shanmugam, P Schaumont - tosc.iacr.org
Hardware faults are a known source of security vulnerabilities. Fault injection in secure
embedded systems leads to information leakage and privilege escalation, and countless …