Universal mobile electrochemical detector designed for use in resource-limited applications

A Nemiroski, DC Christodouleas… - Proceedings of the …, 2014 - National Acad Sciences
This paper describes an inexpensive, handheld device that couples the most common forms
of electrochemical analysis directly to “the cloud” using any mobile phone, for use in …

ICSREF: A framework for automated reverse engineering of industrial control systems binaries

A Keliris, M Maniatakos - arxiv preprint arxiv:1812.03478, 2018 - arxiv.org
The security of Industrial Control Systems (ICS) has been attracting increased attention over
the past years, following the discovery of real threats targeting industrial environments …

Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard

P Peris-Lopez, JC Hernandez-Castro… - Computer Standards & …, 2009 - Elsevier
In 2006, the standard EPC Class-1 Generation-2 (EPC-C1G2) was ratified both by
EPCglobal and ISO. This standard can be considered as a “universal” specification for low …

[PDF][PDF] Volatile FPGA design security–a survey

S Drimer - IEEE Computer Society Annual Volume, 2008 - Citeseer
Volatile FPGAs, the dominant type of programmable logic devices, are used for space,
military, automotive, and consumer electronics applications which require them to operate in …

Security for volatile FPGAs

S Drimer - 2009 - cl.cam.ac.uk
With reconfigurable devices fast becoming complete systems in their own right, interest in
their security properties has increased. While research on “FPGA security” has been active …

Bi-criteria appointment scheduling of patients with heterogeneous service sequences

A Saremi, P Jula, T ElMekkawy, GG Wang - Expert Systems with …, 2015 - Elsevier
This article addresses the challenges of scheduling patients with stochastic service times
and heterogeneous service sequences in multi-stage facilities, while considering the …

Authentication of FPGA bitstreams: Why and how

S Drimer - International Workshop on Applied Reconfigurable …, 2007 - Springer
Encryption of volatile FPGA bitstreams provides confidentiality to the design but does not
ensure its authenticity. This paper motivates the need for adding authentication to the …

Splice: Efficiently Removing a User's Data from In-memory Application State

X Han, J Mickens, S Sen - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Splice is a new programming framework that allows security-conscious applications to
efficiently locate and delete a user's in-memory state. The core technical challenge is …

Cryptanalysis of an EPC class-1 generation-2 standard compliant authentication protocol

P Peris-Lopez, JC Hernandez-Castro… - … Applications of Artificial …, 2011 - Elsevier
Abstract Recently, Chen and Deng (2009) proposed an interesting new mutual
authentication protocol. Their scheme is based on a cyclic redundancy code (CRC) and a …

Data integrity algorithm based on additive generators and hash function

V Fomichev, D Bobrovskiy, A Koreneva… - Journal of Computer …, 2022 - Springer
Ensuring the integrity of data is one of the staple objectives in information security. For this
purpose, one can use different algorithms and approaches based on cryptographic hash …