Treffer 1 - 20 von 37.023

1

Diode-Based Multi-Trojan RF Retroreflector Attack
Granier, Pierre ; Nicolas, Marie-Aïnhoa ; Lorandel, Jordane ; et al.
2025 International Symposium on Electromagnetic Compatibility – EMC Europe. :784-789

[SPI.ELEC] Engineering S... Intentional electromagne... Electromagnetic informat... Backscattering Hardware Trojan [SPI.TRON] Engineering S...
Fachzeitschrift
Zu den Favoriten
2

Clock-to-Clock Modulation Covert Channel
Bahi, Mohamed Alla Eddine ; Real, Maria Mendez ; Nogues, Erwan ; et al.
2025 International Symposium on Electromagnetic Compatibility – EMC Europe. :869-874

side-channel attack air-gap systems [INFO.INFO-TS] Computer... [SPI.ELEC] Engineering S... hardware security electromagnetic covert a...
Fachzeitschrift
Zu den Favoriten
3

Practical Deniable Post-Quantum X3DH: A Lightweight Split-KEM for K-Waay
Guilhem Niot ; Niot, Guilhem
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security. :298-312

[INFO.INFO-CR] Computer...
Fachzeitschrift
Zu den Favoriten
4

Formal Analysis of SDNsec: Attacks and Corrections for Payload, Route Integrity and Accountability
Ayoub Ben Hassen ; Pascal Lafourcade ; Dhekra Mahmoud ; et al.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security. :1476-1489

SDN Security ProVerif Formal Methods Protocols Routing
Fachzeitschrift
Zu den Favoriten
5

Knowledge Systematization for Security Orchestration in CPS and IoT Systems
Nguyen, Phu ; Song, Hui ; Dautov, Rustem ; et al.
2025 IEEE International Conference on Cyber Security and Resilience (CSR). :672-678

IoT Protection Security Orchestration Resilience Systematic literature re... Internet of Things
Fachzeitschrift
Zu den Favoriten
6

MobileViT-based Detection of Anomaly in Measurements of Nuclear Power Plant Core Temperature
Cogranne, Rémi ; Cogranne, Rémi ; IEEE
2025 International Conference on Advanced Machine Learning and Data Science (AMLDS). :502-508

[INFO.INFO-AI] Computer... Artificial intelligence Image processing CUSUM Sequential methods Empirical evaluation
Fachzeitschrift
Zu den Favoriten
7

AudioGap: An AirGapped Covert Channel Exploiting the Frequency Diversity of Audio IC Electromagnetic Leakage
Bahi, Mohamed ; Méndez Real, Maria ; Nogues, Erwan ; et al.
2025 IEEE 49th Annual Computers, Software, and Applications Conference (COMPSAC). :989-994

CFDM [INFO.INFO-TS] Computer... [SPI.ELEC] Engineering S... Signal Processing Electromagnetic Attack Hardware Security
Fachzeitschrift
Zu den Favoriten
8

Side-Channel Extraction of Dataflow AI Accelerator Hardware Parameters
Lomet, Guillaume ; Salvador, Ruben ; Colombier, Brice ; et al.
2025 IEEE 31st International Symposium on On-Line Testing and Robust System Design (IOLTS). :1-7

FOS: Computer and inform... IP Piracy Side-channel analysis Cryptography and Securit... Deep neural network Reverse engineering
Fachzeitschrift
Zu den Favoriten
9

Detecting Hardware Trojans in Microprocessors via Hardware Error Correction Code-based Modules
Palumbo, Alessandro ; Salvador, Ruben ; Palumbo, Alessandro
2025 IEEE 31st International Symposium on On-Line Testing and Robust System Design (IOLTS). :1-7

FOS: Computer and inform... Cryptography and Securit... Hardware Trojans Hardware Security RISC-V Error Correction Codes
Fachzeitschrift
Zu den Favoriten
10

Class Loaders in the Middle: Confusing Android Static Analyzers
Mineau, Jean-Marie ; Lalande, Jean-François ; Lalande, Jean-François
Digital Threats: Research and Practice. 6:1-19

code obfuscation static analysis Android class loading [INFO.INFO-CR] Computer...
Fachzeitschrift
Zu den Favoriten
11

Enhancing DFT Security in Chiplet-Based Systems With Encryption and Integrity Checking
Juan Suzano ; Anthony Philippe ; Fady Abouzeid ; et al.
IEEE Journal on Emerging and Selected Topics in Circuits and Systems. 15:493-505

IEEE 1687 Chiplet [INFO.INFO-AR] Computer... Design for Testability (... IJTAG [INFO.INFO-ET] Computer...
Fachzeitschrift
Zu den Favoriten
12

Do Not Trust Power Management: A Survey on Internal Energy-based Attacks Circumventing Trusted Execution Environments Security Properties
Gwenn Le Gonidec ; Guillaume Bouffard ; Jean-Christophe Prevotet ; et al.
ACM Transactions on Embedded Computing Systems. 24:1-35

FOS: Computer and inform... Computer Science - Crypt... Emerging Technologies (c... Hardware Architecture (c... Computer Science - Emerg... Computer Science - Hardw...
Fachzeitschrift
Zu den Favoriten
13

Fingerprint Spoof Generation Using Style Transfer
Abdarahmane Wone ; Joël Di Manno ; Christophe Charrier ; et al.
IEEE Transactions on Biometrics, Behavior, and Identity Science. 7:512-523

[INFO.INFO-CR]Computer S... [INFO.INFO-AI]Computer S...
Fachzeitschrift
Zu den Favoriten
14

Vote&Check: Secure Postal Voting with Reduced Trust Assumptions
Cortier, Véronique ; Debant, Alexandre ; Gaudry, Pierrick ; et al.
Proceedings on Privacy Enhancing Technologies. 2025:333-348

[INFO.INFO-CR] Computer...
Fachzeitschrift
Zu den Favoriten
15

The Art of Bonsai: How Well-Shaped Trees Improve the Communication Cost of MLS
Chevalier, Céline ; Lebrun, Guirec ; Martinelli, Ange ; et al.
2025 IEEE 10th European Symposium on Security and Privacy (EuroS&P). :655-676

CGKA [INFO.INFO-NI] Computer... Binary Tree TreeKEM Key Tree Ternary Tree
Fachzeitschrift
Zu den Favoriten
16

Unstripping Cloud Container ELF Binaries
Brossard, Jonathan ; Brossard, Jonathan ; IEEE
2025 International Conference on Emerging Technologies and Computing (IC_ETC). :1-6

Cloud binaries Reverse Engineering NIS2 ELF unstripping ELF unstripping Reverse... debugging
Fachzeitschrift
Zu den Favoriten
17

Secure access to network data for mobile network traffic analysis applications
Mvondo Djob, Djob ; Bromberg, Yérom-David ; MVONDO DJOB, DJOB
2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). :609-626

[INFO.INFO-MC] Computer... [INFO.INFO-NI] Computer... [INFO.INFO-OS] Computer... Système d'exploitation Noyau linux Sécurité mobile
Fachzeitschrift
Zu den Favoriten
18

An Open-source Implementation and Security Analysis of Triad’s TEE Trusted Time Protocol
Bettinger, Matthieu ; Ben Mokhtar, Sonia ; Simonet-Boulogne, Anthony ; et al.
2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S). :133-139

FOS: Computer and inform... delay attack Cryptography and Securit... trusted execution enviro... trusted time resilience
Fachzeitschrift
Zu den Favoriten
19

Host-Based Intrusion Detection for Industrial Control Systems
Alla, Omayma ; Mocanu, Stéphane ; ALLA, OMAYMA
2025 IEEE 11th International Conference on Network Softwarization (NetSoft). :265-268

[INFO.INFO-SY] Computer... Industrial Control Syste... Programmable Logic Contr... Runtime Monitoring [INFO.INFO-CR] Computer...
Fachzeitschrift
Zu den Favoriten
20

Advances in Lightweight Cross-Architecture Procedural Debugging
Brossard, Jonathan ; Brossard, Jonathan
2025 12th IFIP International Conference on New Technologies, Mobility and Security (NTMS). :109-114

Reverse Engineering NIS2 Libification Reverse Eng... lightweight debugging Libification CRA
Fachzeitschrift
Zu den Favoriten

Filter