-
1
-
-
85014332650
-
Security in embedded systems: Design challenges
-
Aug
-
S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, "Security in embedded systems: Design challenges," ACM Trans. Embed. Comput. Syst., vol. 3, no. 3, pp. 461-491, Aug. 2004.
-
(2004)
ACM Trans. Embed. Comput. Syst
, vol.3
, Issue.3
, pp. 461-491
-
-
Ravi, S.1
Raghunathan, A.2
Kocher, P.3
Hattangady, S.4
-
2
-
-
2342652200
-
Tamper resistance mechanisms for secure embedded systems
-
S. Ravi, A. Raghunathan, and S. Chakradhar, "Tamper resistance mechanisms for secure embedded systems," in. Proc. IEEE Int. Conf. VLSI Design, 2004, pp. 605-611.
-
(2004)
Proc. IEEE Int. Conf. VLSI Design
, pp. 605-611
-
-
Ravi, S.1
Raghunathan, A.2
Chakradhar, S.3
-
3
-
-
10944254818
-
Mobile phones as computing devices: The viruses are coming!
-
Oct./Dec
-
D. Dagon, T. Martin, and T. Staner, "Mobile phones as computing devices: The viruses are coming!," IEEE Pervasive Computing, vol. 3, no. 4, pp. 11-15, Oct./Dec. 2004.
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 11-15
-
-
Dagon, D.1
Martin, T.2
Staner, T.3
-
4
-
-
2642584004
-
Denial-of-service attacks on battery-powered mobile computers
-
T. Martin, M. Hsiao, D. Ha, and J. Krishnaswami, "Denial-of-service attacks on battery-powered mobile computers," in Proc. 2nd IEEE Pervasive Comput. Conf., 2004, pp. 309-318.
-
(2004)
Proc. 2nd IEEE Pervasive Comput. Conf
, pp. 309-318
-
-
Martin, T.1
Hsiao, M.2
Ha, D.3
Krishnaswami, J.4
-
5
-
-
7544240855
-
SoC securiy: A war against side-channels
-
Jul./Aug
-
S. Guilley and R. Pacalet, "SoC securiy: A war against side-channels," Annals Telecommun., Syst. sur puce electron, pour les telcommun., vol. 59, no. 7-8, pp. 998-1009, Jul./Aug. 2004.
-
(2004)
Annals Telecommun., Syst. sur puce electron, pour les telcommun
, vol.59
, Issue.7-8
, pp. 998-1009
-
-
Guilley, S.1
Pacalet, R.2
-
6
-
-
35248827733
-
Power analysis of FPGAs: How practical is the attack?
-
F.-X. Standaert, L. Van Oldeneel tot Oldenzeel, D. Samyde, and J.-J. Quisquater, "Power analysis of FPGAs: How practical is the attack?," in Proc. Int. Conf. Field-Program. Logic Appl (FPL), LNCS 2778, 2003, pp. 701-711.
-
(2003)
Proc. Int. Conf. Field-Program. Logic Appl (FPL), LNCS
, vol.2778
, pp. 701-711
-
-
Standaert, F.-X.1
Van Oldeneel tot Oldenzeel, L.2
Samyde, D.3
Quisquater, J.-J.4
-
8
-
-
26444453357
-
Security aspects of FPGAs in cryptographic applications
-
T. Wollinger and C. Paar, W. Rosenstiel and P. Lysaght, Eds, Norwell, MA: Kluwer
-
T. Wollinger and C. Paar, , W. Rosenstiel and P. Lysaght, Eds., "Security aspects of FPGAs in cryptographic applications," in New Algorithms, Architectures, and Applications for Reconfigurable Computing. Norwell, MA: Kluwer, 2004.
-
(2004)
New Algorithms, Architectures, and Applications for Reconfigurable Computing
-
-
-
9
-
-
21644458439
-
Implementing an untrusted operating system on trusted hardware
-
D. Lie, C. A. Thekkath, and M. Horowitz, "Implementing an untrusted operating system on trusted hardware," in Proc. 19th ACM Symp. Operat. Syst. Principles, 2003, pp. 178-192.
-
(2003)
Proc. 19th ACM Symp. Operat. Syst. Principles
, pp. 178-192
-
-
Lie, D.1
Thekkath, C.A.2
Horowitz, M.3
-
10
-
-
38349094226
-
Secure program execution via dynamic information flow tracking
-
E. Suh, J. Lee, S. Devadas, and D. Zhang, "Secure program execution via dynamic information flow tracking," MIT, Boston, Memo-467, 2003.
-
(2003)
MIT, Boston, Memo-467
-
-
Suh, E.1
Lee, J.2
Devadas, S.3
Zhang, D.4
-
11
-
-
12844260675
-
HIDE: An infrastructure for efficiently protecting information leakage on the address bus
-
X. Zhuang, T. Zhang, and S. Pande, "HIDE: An infrastructure for efficiently protecting information leakage on the address bus," in Proc. 11th Int. Conf. Arch. Support for Program. Lang. Oper. Syst. (ASPLOS XI), 2004, pp. 72-84.
-
(2004)
Proc. 11th Int. Conf. Arch. Support for Program. Lang. Oper. Syst. (ASPLOS XI)
, pp. 72-84
-
-
Zhuang, X.1
Zhang, T.2
Pande, S.3
-
12
-
-
3242773027
-
High-throughput programmable cryptocoprocessor
-
May/Jun
-
A. Hodjat and I. Verbauwhede, "High-throughput programmable cryptocoprocessor," IEEE Micro, vol. 24, no. 3, pp. 34-45, May/Jun. 2004.
-
(2004)
IEEE Micro
, vol.24
, Issue.3
, pp. 34-45
-
-
Hodjat, A.1
Verbauwhede, I.2
-
13
-
-
18844374511
-
AES and the cryptonite crypt processor
-
D. Oliva, R. Buchty, and N. Heintze, "AES and the cryptonite crypt processor," in. Proc. CASES, 2003, pp. 198-209.
-
(2003)
Proc. CASES
, pp. 198-209
-
-
Oliva, D.1
Buchty, R.2
Heintze, N.3
-
14
-
-
0345382713
-
Domain-specific codesign for embedded security
-
Apr
-
P. Schaumont and I. Verbauwhede, "Domain-specific codesign for embedded security," IEEE Computer, vol. 36, no. 4, pp. 68-74, Apr. 2003.
-
(2003)
IEEE Computer
, vol.36
, Issue.4
, pp. 68-74
-
-
Schaumont, P.1
Verbauwhede, I.2
-
15
-
-
0035425820
-
An FPGA-based performance evaluation of the AES block cipher candidate algorithm, finalists
-
Aug
-
A. J. Elbirt, W. Yip, B. Chetwynd, and C. Paar, "An FPGA-based performance evaluation of the AES block cipher candidate algorithm, finalists," IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 9, no. 4, pp. 545-557, Aug. 2001.
-
(2001)
IEEE Trans. Very Large Scale Integr. (VLSI) Syst
, vol.9
, Issue.4
, pp. 545-557
-
-
Elbirt, A.J.1
Yip, W.2
Chetwynd, B.3
Paar, C.4
-
16
-
-
26444534119
-
An adaptive cryptography engine for internet protocol security architectures
-
Jul
-
A. Dandalis and V. K. Prasanna, "An adaptive cryptography engine for internet protocol security architectures," ACM Trans. Des. Autom. Electron. Syst. (TODAES), vol. 9, no. 3, pp. 333-353, Jul. 2004.
-
(2004)
ACM Trans. Des. Autom. Electron. Syst. (TODAES)
, vol.9
, Issue.3
, pp. 333-353
-
-
Dandalis, A.1
Prasanna, V.K.2
-
17
-
-
38349104261
-
Combining software and hardware monitoring for improved power and performance tuning
-
E. Chi, A. M. Salem, R. I. Bahar, and R. Weiss, "Combining software and hardware monitoring for improved power and performance tuning," in Proc. 7th Ann. Workshop Interaction Between Compilers Comput. Arch. (INTERACT-7), 2003, pp. 57-64.
-
(2003)
Proc. 7th Ann. Workshop Interaction Between Compilers Comput. Arch. (INTERACT-7)
, pp. 57-64
-
-
Chi, E.1
Salem, A.M.2
Bahar, R.I.3
Weiss, R.4
-
18
-
-
0035691414
-
Reducing power with dynamic critical path information
-
J. S. Seng, E. S. Tune, and D. M. Tullsen, "Reducing power with dynamic critical path information," in Proc. 34th Int. Symp. Microarch., 2001, pp. 114-123.
-
(2001)
Proc. 34th Int. Symp. Microarch
, pp. 114-123
-
-
Seng, J.S.1
Tune, E.S.2
Tullsen, D.M.3
-
19
-
-
33644854066
-
Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices
-
D. Nash, T. Martin, D. Ha, and M. Hsiao, "Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices," in Proc. 2nd Int. Workshop Pervasive Comput. Commun. Security, 2005, pp. 141-145.
-
(2005)
Proc. 2nd Int. Workshop Pervasive Comput. Commun. Security
, pp. 141-145
-
-
Nash, D.1
Martin, T.2
Ha, D.3
Hsiao, M.4
-
20
-
-
26444437213
-
Configurable computing for high-security/high-performance ambient systems
-
Jul
-
G. Gogniat, W. Burleson, and L. Bossuet, "Configurable computing for high-security/high-performance ambient systems," Lecture Notes Comput. Sci., vol. 3553, pp. 72-81, Jul. 2005.
-
(2005)
Lecture Notes Comput. Sci
, vol.3553
, pp. 72-81
-
-
Gogniat, G.1
Burleson, W.2
Bossuet, L.3
-
21
-
-
33847134463
-
Dynamically configurable security for SRAM FPGA bitstreams
-
L. Bossuet, G. Gogniat, and W. Burleson, "Dynamically configurable security for SRAM FPGA bitstreams," in Proc. 11th Reconfigurable Arch. Workshop (RAW), 2004, pp. 146-153.
-
(2004)
Proc. 11th Reconfigurable Arch. Workshop (RAW)
, pp. 146-153
-
-
Bossuet, L.1
Gogniat, G.2
Burleson, W.3
-
23
-
-
38349136797
-
-
R. L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin, The RC6 block cipher, Version 1.1 Aug. 20, 1998 [Online, Available
-
R. L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin, "The RC6 block cipher, Version 1.1" Aug. 20, 1998 [Online]. Available: ftp://ftp.rsasecurity.com/pub/rsalabs/rc6/rc6v11.pdf
-
-
-
-
26
-
-
18144370087
-
Parity based concurrent error detection for the advanced encryption standard
-
K. Wu, R. Karri, G. Kuznetsov, and M. Goessel, "Parity based concurrent error detection for the advanced encryption standard," in Proc. Int. Test Conf. (ITC), 2004, pp. 1242-1248.
-
(2004)
Proc. Int. Test Conf. (ITC)
, pp. 1242-1248
-
-
Wu, K.1
Karri, R.2
Kuznetsov, G.3
Goessel, M.4
-
27
-
-
29144464024
-
-
Xilinx, San Jose, CA, Appl. Note 197 XAPP197, Nov
-
C. Carmichael, "Triple module redundancy design techniques for virtex FPGAs," Xilinx, San Jose, CA, Appl. Note 197 (XAPP197), Nov. 2001.
-
(2001)
Triple module redundancy design techniques for virtex FPGAs
-
-
Carmichael, C.1
-
29
-
-
26444488696
-
An FPGA runtime system for dynamical on-demand reconfiguration
-
M. Ullmann, B. Grimm, M. Huebner, and J. Becker, "An FPGA runtime system for dynamical on-demand reconfiguration," in Proc. 11th Reconfigurable Arch. Workshop (RAW), 2004, pp. 135-142.
-
(2004)
Proc. 11th Reconfigurable Arch. Workshop (RAW)
, pp. 135-142
-
-
Ullmann, M.1
Grimm, B.2
Huebner, M.3
Becker, J.4
-
30
-
-
84856158003
-
Power estimation and power measurement of Xilinx virtex FPGAs: Trade-offs and limitations
-
J. Becker, M. Huebner, and M. Ullmann, "Power estimation and power measurement of Xilinx virtex FPGAs: Trade-offs and limitations," in Proc. IEEE Symp. Intregr. Circuits Syst. Des., 2003, pp. 283-288.
-
(2003)
Proc. IEEE Symp. Intregr. Circuits Syst. Des
, pp. 283-288
-
-
Becker, J.1
Huebner, M.2
Ullmann, M.3
|