过去一年中添加的文章,按日期排序

High-Level Synthesis Countermeasure Using Threshold Implementation with Mixed Number of Shares

G Hiruma, M Yang, Y Li, K Sakiyama… - Proceedings of the 14th …, 2024 - dl.acm.org
8 天前 - … a novel HLS-based countermeasure that mixes different numbers of shares to
reduce the hardware overhead. Our countermeasure demonstrates secure against SCA while …

[PDF][PDF] Things (IoT) Applications

MT Arafin, D Anand, G Qu - tanvirarafin.github.io
10 天前 - Things necessitates a thorough study of their security vulnerabilities and corresponding
countermeasures… demonstrations of weaknesses and vulnerabilities of GPS signals and …

Classification of Malware for Security Improvement in IoT using Heuristic Aided Adaptive Multi-scale and Dilated ResneXt with Gated Recurrent Unit

J Jagadeesan, S Nandhini, B Sathiyaprasad - Applied Soft Computing, 2024 - Elsevier
10 天前 - … initial steps toward implementing countermeasures for attack prevention and mitigation.
So, … the security of IoT devices, protecting them from potential threats and vulnerabilities. …

Securing MQTT Ecosystem: Exploring Vulnerabilities, Mitigations, and Future Trajectories

W Li, S Manickam, P Nanda, AK Al-Ani… - IEEE …, 2024 - ieeexplore.ieee.org
16 天前 - … We will touch upon the efficacy of these countermeasures, underscoring both their
advantages and potential limitations. In addition, it is important to understand that MQTT is …

[PDF][PDF] A Survey on Intelligent Internet of Things: Applications, Security, Privacy, and Future Directions

O Aouedi, TH Vu, A Sacco, DC Nguyen, K Piamrat… - arXiv e-prints, 2024 - arxiv.org
19 天前 - … important security issues in IIoT networks, where network attacks, confidentiality,
integrity, and intrusion are analyzed, along with a discussion of potential countermeasures. …

[PDF][PDF] Access Control Attacks against IoT Smart Devices: A Case Study

SJ Philip, F Amisha, F Kamesh - researchgate.net
26 天前 - … -of-service attacks. Consumers need to be aware of such vulnerabilities that could
lead to the compromise of their organizational security countermeasures since weak access …

AI-Enabled Hardware Security Approach for Aging Classification and Manufacturer Identification of SRAM PUFs

H Singh - 2024 - rave.ohiolink.edu
27 天前 - … This work proposes a novel AI-enabled security for reliable SRAM PUFs. The
proposed approach aims to study and countermeasure the impact of aging on SRAM PUF by …

[PDF][PDF] Beyond the Lens: False Data Injection Attacks on IIoT-Cameras through MQTT Manipulation

W Alsabbagh, C Kim, NS Patil, P Langendörfer - researchgate.net
34 天前 - security measures and countermeasures to fortify IIoT systems against such attacks,
aiming to … All our attack codes as well as a proof-of-concept are publicly available for further …

Side-channel attack–resistant PRESENT cipher by versatile key scheduling and compact S-box utilizing optimized three-phase logic design

RS Jenny, R Sudhakar - Cryptologia, 2024 - Taylor & Francis
43 天前 - … TEL logic style as a countermeasure against side-channel attacks: Secure cells
library in 65nm CMOS and experimental results. IEEE Transactions on Circuits and Systems I: …

Strengthening Cloud Applications: A Deep Dive into Kill Chain Identification, Scoring, and Automatic Penetration Testing

S Simonetto - International Conference on Research Challenges in …, 2024 - Springer
54 天前 - vulnerability prioritization. The resilience of systems against potential breaches can
be enhanced by intertwining attack pathways with comprehensive countermeasuressecurity