Sciweavers

2945 search results - page 8 / 589
» Designing and Implementing Malicious Hardware
Sort
View
CATA
2010
14 years 12 months ago
A Hardware Implementation of the Advanced Encryption Standard (AES) Algorithm using SystemVerilog
In this paper, a hardware implementation of the AES128 encryption algorithm is proposed. A unique feature of the proposed pipelined design is that the round keys, which are consum...
Bahram Hakhamaneshi, Behnam S. Arad
HOST
2009
IEEE
15 years 6 months ago
Detecting Trojan Circuit Attacks
Abstract—Rapid advances in integrated circuit (IC) development predicted by Moore’s Law lead to increasingly complex, hard to verify IC designs. Design insiders or adversaries ...
Gedare Bloom, Bhagirath Narahari, Rahul Simha
DSD
2007
IEEE
131views Hardware» more  DSD 2007»
15 years 1 months ago
Design and Implementation of a 50MHZ DXT CoProcessor
Mohammad Amin Amiri, Reza Ebrahimi Atani, Sattar M...
115
Voted
WWW
2011
ACM
14 years 6 months ago
Prophiler: a fast filter for the large-scale detection of malicious web pages
Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and, subsequently, for creating large-scale botnets. In...
Davide Canali, Marco Cova, Giovanni Vigna, Christo...
IPPS
2005
IEEE
15 years 5 months ago
RC-BLAST: Towards a Portable, Cost-Effective Open Source Hardware Implementation
Basic Local Alignment Search Tool (BLAST) is a standard computer application that molecular biologists use to search for sequence similarity in genomic databases. This report desc...
Krishna Muriki, Keith D. Underwood, Ron Sass