Proceedings of the WESS'15: Workshop on Embedded Systems Security (original) (raw)

Proceedings of the WESS'15: Workshop on Embedded Systems Security - WESS'15

Stavros Koubias

2015

View PDFchevron_right

Security in Embedded Systems : Vulnerabilities , Pigeonholing of Attacks and Countermeasures

Vijeet Meshram

2016

View PDFchevron_right

Embedded Systems Security

Muhammad Farooq-i-Azam

View PDFchevron_right

Embedded Systems Security Challenges

Konstantinos Rantos

View PDFchevron_right

Embedded Systems: Security Threats and Solutions

American journal of Engineering Research (AJER)

View PDFchevron_right

Evolution of Embedded Platform Security Technologies: Past, Present & Future Challenges

Sakir Sezer

2020 IEEE 33rd International System-on-Chip Conference (SOCC), 2020

View PDFchevron_right

Embedded Systems Security: Threats, Vulnerabilities, and Attack Taxonomy

Vania Nuraini

View PDFchevron_right

A Survey on Hardware Security: Current Trends and Challenges

Kasem Khalil

IEEE Access

View PDFchevron_right

The Security Vulnerabilities on Internet-Enabled Embedded Systems

Merve Altinbaş, Melike Sarikaya, Doç. Dr. AHMET EFE

Erzincan Journal of Science and Technology, 2019

View PDFchevron_right

Embedded system security

Thiru Neels

Computer, 2004

View PDFchevron_right

On security issues in embedded systems: challenges and solutions

Lyes Khelladi

International Journal of Information and Computer Security, 2008

View PDFchevron_right

Embedded Systems Security: A Survey of EU Research Efforts

Harry Manifavas, Konstantinos Fysarakis

Security and Communication Networks, 2014

View PDFchevron_right

Computer security by hardware-intrinsic authentication

mario cortes

2015 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS), 2015

View PDFchevron_right

Security considerations in embedded systems

Armin Wasicek

… of Computer Engineering, Vienna University of …, 2006

View PDFchevron_right

Hardware Security in IoT Devices with Emphasis on Hardware Trojans

bassam mohd

Journal of Sensor and Actuator Networks, 2019

View PDFchevron_right

Demonstrating the Threat of Hardware Trojans in Wireless Sensor Networks

Anu Bourgeois

2015 24th International Conference on Computer Communication and Networks (ICCCN), 2015

View PDFchevron_right

Hardware Security in Sensor and its Networks

Joseph Heacock

Frontiers in Sensors

View PDFchevron_right

Hardware Trojan Attacks: Threat Analysis and Countermeasures

Seetharam Narasimhan

Proceedings of the IEEE, 2014

View PDFchevron_right

A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan

Ang Cui

Proceedings of the 26th Annual Computer Security …, 2010

View PDFchevron_right

Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

Apostolos Fournaris

Electronics

View PDFchevron_right

Collaborative Monitors for Embedded System Security

Dhruv Kumar

Proceedings of the First …, 2006

View PDFchevron_right

Secure architecture in embedded systems: an overview

Guy Gogniat

Proc. Workshop Reconfigurable Comm.- …, 2006

View PDFchevron_right

Hardware Security in Emerging Technologies: Vulnerabilities, Attacks, and Solutions

Naghmeh Karimi

IEEE Journal on Emerging and Selected Topics in Circuits and Systems

View PDFchevron_right

Security engineering for embedded systems

Antonio Maña

Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems - S&D4RCES '10, 2010

View PDFchevron_right

Security as a New Dimension in Embedded System Design

Ruby B. Lee

View PDFchevron_right

Hardware Security Framework A MUST for Mission Critical IoT Applications

Alex Karasulu

View PDFchevron_right

Hardware trojans and smart manufacturing – a hardware security perspective

sohaib aslam

2018

View PDFchevron_right

(Invited) Hardware Security to Mitigate Threats to Networked More-Than-Moore Sensors

Yaw Obeng

ECS Transactions, 2016

View PDFchevron_right

Hardware Security, Vulnerabilities, and Attacks: A Comprehensive Taxonomy

Paolo Prinetto

2020

View PDFchevron_right

Embedded Security for Internet of Things

Jaydip Sen

Proceedings of the 2nd National Conference on Emerging Trends and Applications in Computer Science (NCETACS), March 4 -5, 2011, Shillong, India, pp. 50 - 55., 2011

View PDFchevron_right

Sensor network hardware security

Filip Tsvetanov

THE 9TH INTERNATIONAL CONFERENCE OF THE INDONESIAN CHEMICAL SOCIETY ICICS 2021: Toward a Meaningful Society

View PDFchevron_right

Security and Cryptographic Engineering in Embedded Systems

Paris Kitsos

Applications, Optimization, and Advanced Design

View PDFchevron_right

A taxonomy of attacks on secure devices

Luke Wildman

2003

View PDFchevron_right

Application of ICmetrics for Embedded System Security

Xiaojun Zhai, Shoaib Ehsan, Kofi Appiah

2013 Fourth International Conference on Emerging Security Technologies, 2013

View PDFchevron_right