A Comparison of Backscattering, EM, and Power Side-Channels and Their Performance in Detecting Software and Hardware Intrusions (English)
- New search for: Nguyen, Luong N.
- Further information on Nguyen, Luong N.:
- https://orcid.org/http://orcid.org/0000-0001-8555-4376
- New search for: Cheng, Chia-Lin
- New search for: Werner, Frank T.
- New search for: Prvulovic, Milos
- New search for: Zajic, Alenka
- New search for: Nguyen, Luong N.
- Further information on Nguyen, Luong N.:
- https://orcid.org/http://orcid.org/0000-0001-8555-4376
- New search for: Cheng, Chia-Lin
- New search for: Werner, Frank T.
- New search for: Prvulovic, Milos
- New search for: Zajic, Alenka
In:
Journal of Hardware and Systems Security
;
4
, 2
;
150-165
;
2020
- Article (Journal) / Electronic Resource
-
Title:A Comparison of Backscattering, EM, and Power Side-Channels and Their Performance in Detecting Software and Hardware Intrusions
-
Additional title:J Hardw Syst Secur
-
Contributors:Nguyen, Luong N. ( author ) / Cheng, Chia-Lin ( author ) / Werner, Frank T. ( author ) / Prvulovic, Milos ( author ) / Zajic, Alenka ( author )
-
Published in:Journal of Hardware and Systems Security ; 4, 2 ; 150-165
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2020-06-01
-
Size:16 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 4, Issue 2
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 69
-
A Chaos-Based Complex Micro-instruction Set for Mitigating Instruction Reverse EngineeringHasan, Md Sakib / Majumder, Md Badruddoja / Shanta, Aysha S. / Uddin, Mesbah / Rose, Garrett S. et al. | 2020
- 86
-
“S-Box” Implementation of AES Is Not Side Channel ResistantC., Ashokkumar / Roy, Bholanath / Venkatesh, M. Bhargav Sri / Menezes, Bernard L. et al. | 2020
- 98
-
A practical application of game theory to optimize selection of hardware Trojan detection strategiesGraf, Jonathan / Batchelor, Whitney / Harper, Scott / Marlow, Ryan / Carlisle, Edward / Athanas, Peter et al. | 2020
- 120
-
Throughput/Area Efficient Implementation of Scalable Polynomial Basis MultiplicationRashidi, Bahram et al. | 2020
- 136
-
USB-Watch: a Generalized Hardware-Assisted Insider Threat Detection FrameworkDenney, Kyle / Babun, Leonardo / Uluagac, A. Selcuk et al. | 2020
- 150
-
A Comparison of Backscattering, EM, and Power Side-Channels and Their Performance in Detecting Software and Hardware IntrusionsNguyen, Luong N. / Cheng, Chia-Lin / Werner, Frank T. / Prvulovic, Milos / Zajic, Alenka et al. | 2020