Rahimi et al., 2021 - Google Patents
Trends and challenges in ensuring security for low-power and high-performance embedded SoCsRahimi et al., 2021
- Document ID
- 2251084640176172980
- Author
- Rahimi P
- Singh A
- Wang X
- Prakash A
- Publication year
- Publication venue
- 2021 IEEE 14th International Symposium on Embedded Multicore/Many-core Systems-on-Chip (MCSoC)
External Links
Snippet
In recent years, security, power consumption, and performance have become the important issues in embedded SoCs' design. With the growing number of embedded devices for automotive electronic and electric vehicles, real-time systems, robotics, artificial intelligence …
- 238000004805 robotic 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1633—Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
- G06F1/1635—Details related to the integration of battery packs and other power supplies such as fuel cells or integrated AC adapter
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/725—Finite field arithmetic over elliptic curves
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hu et al. | An overview of hardware security and trust: Threats, countermeasures, and design tools | |
Liang et al. | A double PUF-based RFID identity authentication protocol in service-centric internet of things environments | |
Babar et al. | Proposed embedded security framework for internet of things (iot) | |
Shepherd et al. | Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis | |
Martin et al. | Denial-of-service attacks on battery-powered mobile computers | |
Ukil et al. | Embedded security for Internet of Things | |
Jin et al. | Security of cloud FPGAs: A survey | |
Yan et al. | A study on power side channels on mobile devices | |
Lu | A survey on risc-v security: Hardware and architecture | |
Venugopalan et al. | Surveying the hardware trojan threat landscape for the internet-of-things | |
Qu et al. | Design THINGS for the Internet of Things—An EDA perspective | |
Konigsmark et al. | System-of-PUFs: Multilevel security for embedded systems | |
Sengupta et al. | Guest editorial securing IoT hardware: threat models and reliable, low-power design solutions | |
CN114239082A (en) | Anti-attack Internet of things security chip, method and device integrating national cryptographic algorithm | |
Sravani et al. | Attacks on cryptosystems implemented via VLSI: A review | |
Duan et al. | A survey of recent attacks and mitigation on FPGA systems | |
Konigsmark et al. | Information dispersion for trojan defense through high-level synthesis | |
Naveenkumar et al. | A survey on recent detection methods of the hardware trojans | |
Rahimi et al. | Trends and challenges in ensuring security for low-power and high-performance embedded SoCs | |
Proulx et al. | A survey on fpga cybersecurity design strategies | |
Kumar et al. | A comprehensive survey on hardware-assisted malware analysis and primitive techniques | |
Lee et al. | Design and implementation of secure cryptographic system on chip for Internet of Things | |
Gross et al. | Fpganeedle: Precise remote fault attacks from fpga to cpu | |
Gao et al. | A novel approximate computing based security primitive for the Internet of Things | |
Mohd et al. | Run-time monitoring and validation using reverse function (RMVRF) for hardware trojans detection |