Sciweavers

11603 search results - page 18 / 2321
» Embedded System Security
Sort
View
SIGMOD
2010
ACM
436views Database» more  SIGMOD 2010»
14 years 9 months ago
Pluggable personal data servers
An increasing amount of personal data is automatically gathered on servers by administrations, hospitals and private companies while several security surveys highlight the failure...
Nicolas Anciaux, Luc Bouganim, Yanli Guo, Philippe...
80
Voted
WORDS
2005
IEEE
15 years 3 months ago
Enhancing DNS Security using the SSL Trust Infrastructure
The main functionality of the Domain Name System (DNS) is to translate symbolic names into IP addresses. Due to the criticality of DNS for the proper functioning of the Internet, ...
Christof Fetzer, Gert Pfeifer, Trevor Jim
CTRSA
2010
Springer
152views Cryptology» more  CTRSA 2010»
15 years 1 months ago
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryp...
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar,...
CASES
2004
ACM
15 years 3 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
CASES
2010
ACM
14 years 7 months ago
A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software
The Advanced Encryption Standard is used in almost every new embedded application that needs a symmetric-key cipher. In such embedded applications, high-performance as well as res...
Ambuj Sinha, Zhimin Chen, Patrick Schaumont