An Offline Hardware Security Assessment Approach using Symbol Assertion and Code Shredding.
Zahra KazemiAmin NorollahMahdi FazeliDavid HélyVincent BeroullePublished in: ISQED (2022)
Keyphrases
- protection scheme
- real time
- windows xp
- random number generator
- information security
- source code
- error correcting
- low cost
- address space
- trusted computing
- hardware and software
- security issues
- key management
- risk assessment
- network security
- access control
- operating system
- database
- security requirements
- intrusion detection
- java virtual machine
- security policies
- protection schemes
- computer systems
- industry standard
- security mechanisms
- statistical databases
- malware detection
- java card
- hardware architecture
- error detection
- data acquisition
- massively parallel
- database systems
- databases
- hardware description language
- advanced encryption standard
- embedded systems