Showing 1 - 20 of 37,023

1

Diode-Based Multi-Trojan RF Retroreflector Attack
Granier, Pierre ; Nicolas, Marie-Aïnhoa ; Lorandel, Jordane ; et al.
2025 International Symposium on Electromagnetic Compatibility – EMC Europe. :784-789

[SPI.ELEC] Engineering S... Intentional electromagne... Electromagnetic informat... Backscattering Hardware Trojan [SPI.TRON] Engineering S...
Academic journal
Save to List
2

Clock-to-Clock Modulation Covert Channel
Bahi, Mohamed Alla Eddine ; Real, Maria Mendez ; Nogues, Erwan ; et al.
2025 International Symposium on Electromagnetic Compatibility – EMC Europe. :869-874

side-channel attack air-gap systems [INFO.INFO-TS] Computer... [SPI.ELEC] Engineering S... hardware security electromagnetic covert a...
Academic journal
Save to List
3

Practical Deniable Post-Quantum X3DH: A Lightweight Split-KEM for K-Waay
Guilhem Niot ; Niot, Guilhem
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security. :298-312

[INFO.INFO-CR] Computer...
Academic journal
Save to List
4

Formal Analysis of SDNsec: Attacks and Corrections for Payload, Route Integrity and Accountability
Ayoub Ben Hassen ; Pascal Lafourcade ; Dhekra Mahmoud ; et al.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security. :1476-1489

SDN Security ProVerif Formal Methods Protocols Routing
Academic journal
Save to List
5

Knowledge Systematization for Security Orchestration in CPS and IoT Systems
Nguyen, Phu ; Song, Hui ; Dautov, Rustem ; et al.
2025 IEEE International Conference on Cyber Security and Resilience (CSR). :672-678

IoT Protection Security Orchestration Resilience Systematic literature re... Internet of Things
Academic journal
Save to List
6

MobileViT-based Detection of Anomaly in Measurements of Nuclear Power Plant Core Temperature
Cogranne, Rémi ; Cogranne, Rémi ; IEEE
2025 International Conference on Advanced Machine Learning and Data Science (AMLDS). :502-508

[INFO.INFO-AI] Computer... Artificial intelligence Image processing CUSUM Sequential methods Empirical evaluation
Academic journal
Save to List
7

AudioGap: An AirGapped Covert Channel Exploiting the Frequency Diversity of Audio IC Electromagnetic Leakage
Bahi, Mohamed ; Méndez Real, Maria ; Nogues, Erwan ; et al.
2025 IEEE 49th Annual Computers, Software, and Applications Conference (COMPSAC). :989-994

CFDM [INFO.INFO-TS] Computer... [SPI.ELEC] Engineering S... Signal Processing Electromagnetic Attack Hardware Security
Academic journal
Save to List
8

Side-Channel Extraction of Dataflow AI Accelerator Hardware Parameters
Lomet, Guillaume ; Salvador, Ruben ; Colombier, Brice ; et al.
2025 IEEE 31st International Symposium on On-Line Testing and Robust System Design (IOLTS). :1-7

FOS: Computer and inform... IP Piracy Side-channel analysis Cryptography and Securit... Deep neural network Reverse engineering
Academic journal
Save to List
9

Detecting Hardware Trojans in Microprocessors via Hardware Error Correction Code-based Modules
Palumbo, Alessandro ; Salvador, Ruben ; Palumbo, Alessandro
2025 IEEE 31st International Symposium on On-Line Testing and Robust System Design (IOLTS). :1-7

FOS: Computer and inform... Cryptography and Securit... Hardware Trojans Hardware Security RISC-V Error Correction Codes
Academic journal
Save to List
10

Class Loaders in the Middle: Confusing Android Static Analyzers
Mineau, Jean-Marie ; Lalande, Jean-François ; Lalande, Jean-François
Digital Threats: Research and Practice. 6:1-19

code obfuscation static analysis Android class loading [INFO.INFO-CR] Computer...
Academic journal
Save to List
11

Enhancing DFT Security in Chiplet-Based Systems With Encryption and Integrity Checking
Juan Suzano ; Anthony Philippe ; Fady Abouzeid ; et al.
IEEE Journal on Emerging and Selected Topics in Circuits and Systems. 15:493-505

IEEE 1687 Chiplet [INFO.INFO-AR] Computer... Design for Testability (... IJTAG [INFO.INFO-ET] Computer...
Academic journal
Save to List
12

Do Not Trust Power Management: A Survey on Internal Energy-based Attacks Circumventing Trusted Execution Environments Security Properties
Gwenn Le Gonidec ; Guillaume Bouffard ; Jean-Christophe Prevotet ; et al.
ACM Transactions on Embedded Computing Systems. 24:1-35

FOS: Computer and inform... Computer Science - Crypt... Emerging Technologies (c... Hardware Architecture (c... Computer Science - Emerg... Computer Science - Hardw...
Academic journal
Save to List
13

Fingerprint Spoof Generation Using Style Transfer
Abdarahmane Wone ; Joël Di Manno ; Christophe Charrier ; et al.
IEEE Transactions on Biometrics, Behavior, and Identity Science. 7:512-523

[INFO.INFO-CR]Computer S... [INFO.INFO-AI]Computer S...
Academic journal
Save to List
14

Vote&Check: Secure Postal Voting with Reduced Trust Assumptions
Cortier, Véronique ; Debant, Alexandre ; Gaudry, Pierrick ; et al.
Proceedings on Privacy Enhancing Technologies. 2025:333-348

[INFO.INFO-CR] Computer...
Academic journal
Save to List
15

The Art of Bonsai: How Well-Shaped Trees Improve the Communication Cost of MLS
Chevalier, Céline ; Lebrun, Guirec ; Martinelli, Ange ; et al.
2025 IEEE 10th European Symposium on Security and Privacy (EuroS&P). :655-676

CGKA [INFO.INFO-NI] Computer... Binary Tree TreeKEM Key Tree Ternary Tree
Academic journal
Save to List
16

Unstripping Cloud Container ELF Binaries
Brossard, Jonathan ; Brossard, Jonathan ; IEEE
2025 International Conference on Emerging Technologies and Computing (IC_ETC). :1-6

Cloud binaries Reverse Engineering NIS2 ELF unstripping ELF unstripping Reverse... debugging
Academic journal
Save to List
17

Secure access to network data for mobile network traffic analysis applications
Mvondo Djob, Djob ; Bromberg, Yérom-David ; MVONDO DJOB, DJOB
2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). :609-626

[INFO.INFO-MC] Computer... [INFO.INFO-NI] Computer... [INFO.INFO-OS] Computer... Système d'exploitation Noyau linux Sécurité mobile
Academic journal
Save to List
18

An Open-source Implementation and Security Analysis of Triad’s TEE Trusted Time Protocol
Bettinger, Matthieu ; Ben Mokhtar, Sonia ; Simonet-Boulogne, Anthony ; et al.
2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S). :133-139

FOS: Computer and inform... delay attack Cryptography and Securit... trusted execution enviro... trusted time resilience
Academic journal
Save to List
19

Host-Based Intrusion Detection for Industrial Control Systems
Alla, Omayma ; Mocanu, Stéphane ; ALLA, OMAYMA
2025 IEEE 11th International Conference on Network Softwarization (NetSoft). :265-268

[INFO.INFO-SY] Computer... Industrial Control Syste... Programmable Logic Contr... Runtime Monitoring [INFO.INFO-CR] Computer...
Academic journal
Save to List
20

Advances in Lightweight Cross-Architecture Procedural Debugging
Brossard, Jonathan ; Brossard, Jonathan
2025 12th IFIP International Conference on New Technologies, Mobility and Security (NTMS). :109-114

Reverse Engineering NIS2 Libification Reverse Eng... lightweight debugging Libification CRA
Academic journal
Save to List

Filter