Sciweavers

2945 search results - page 4 / 589
» Designing and Implementing Malicious Hardware
Sort
View
ISQED
2010
IEEE
156views Hardware» more  ISQED 2010»
15 years 1 months ago
On the design of different concurrent EDC schemes for S-Box and GF(p)
Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...
122
Voted
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
15 years 5 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna
ICCD
2006
IEEE
138views Hardware» more  ICCD 2006»
15 years 8 months ago
Design and Implementation of Software Objects in Hardware
This paper proposes a novel approach to implement software object in hardware. Data-Memory mapping schemes are investigated and four hardware object design schemes are proposed an...
Fu-Chiung Cheng, Hung-Chi Wu
HOST
2009
IEEE
14 years 9 months ago
Experiences in Hardware Trojan Design and Implementation
Abstract-- We report our experiences in designing and implementing several hardware Trojans within the framework of the Embedded System Challenge competition that was held as part ...
Yier Jin, Nathan Kupp, Yiorgos Makris
CHES
2003
Springer
146views Cryptology» more  CHES 2003»
15 years 3 months ago
Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs
Abstract. Performance evaluation of the Advanced Encryption Standard candidates has led to intensive study of both hardware and software implementations. However, although plentifu...
François-Xavier Standaert, Gaël Rouvro...