[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Rahimi et al., 2021 - Google Patents

Trends and challenges in ensuring security for low-power and high-performance embedded SoCs

Rahimi et al., 2021

Document ID
2251084640176172980
Author
Rahimi P
Singh A
Wang X
Prakash A
Publication year
Publication venue
2021 IEEE 14th International Symposium on Embedded Multicore/Many-core Systems-on-Chip (MCSoC)

External Links

Snippet

In recent years, security, power consumption, and performance have become the important issues in embedded SoCs' design. With the growing number of embedded devices for automotive electronic and electric vehicles, real-time systems, robotics, artificial intelligence …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers
    • G06F1/1633Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
    • G06F1/1635Details related to the integration of battery packs and other power supplies such as fuel cells or integrated AC adapter
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/60Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
    • G06F7/72Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
    • G06F7/724Finite field arithmetic
    • G06F7/725Finite field arithmetic over elliptic curves

Similar Documents

Publication Publication Date Title
Hu et al. An overview of hardware security and trust: Threats, countermeasures, and design tools
Liang et al. A double PUF-based RFID identity authentication protocol in service-centric internet of things environments
Babar et al. Proposed embedded security framework for internet of things (iot)
Shepherd et al. Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis
Martin et al. Denial-of-service attacks on battery-powered mobile computers
Ukil et al. Embedded security for Internet of Things
Jin et al. Security of cloud FPGAs: A survey
Yan et al. A study on power side channels on mobile devices
Lu A survey on risc-v security: Hardware and architecture
Venugopalan et al. Surveying the hardware trojan threat landscape for the internet-of-things
Qu et al. Design THINGS for the Internet of Things—An EDA perspective
Konigsmark et al. System-of-PUFs: Multilevel security for embedded systems
Sengupta et al. Guest editorial securing IoT hardware: threat models and reliable, low-power design solutions
CN114239082A (en) Anti-attack Internet of things security chip, method and device integrating national cryptographic algorithm
Sravani et al. Attacks on cryptosystems implemented via VLSI: A review
Duan et al. A survey of recent attacks and mitigation on FPGA systems
Konigsmark et al. Information dispersion for trojan defense through high-level synthesis
Naveenkumar et al. A survey on recent detection methods of the hardware trojans
Rahimi et al. Trends and challenges in ensuring security for low-power and high-performance embedded SoCs
Proulx et al. A survey on fpga cybersecurity design strategies
Kumar et al. A comprehensive survey on hardware-assisted malware analysis and primitive techniques
Lee et al. Design and implementation of secure cryptographic system on chip for Internet of Things
Gross et al. Fpganeedle: Precise remote fault attacks from fpga to cpu
Gao et al. A novel approximate computing based security primitive for the Internet of Things
Mohd et al. Run-time monitoring and validation using reverse function (RMVRF) for hardware trojans detection