Management of system requirements and system architectures is part of any software engineering project. But it is usually very tedious and error prone. In particular, managing the...
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
There are many applications for Secure Multi-Party Computation (SMC), but practical adoption is still an issue. One reason is that the business model of the application does not m...
—The article describes a course on system design (structural approach) which involves the following: issues of systems engineering; structural models; basic technological problem...