A secure and resilient 6G architecture vision of the German flagship project 6G-ANNA
M Hoffmann, G Kunzmann, T Dudda, R Irmer… - IEEE …, 2023 - ieeexplore.ieee.org
The 6th generation of wireless mobile networks is emerging as a paradigm shifting
successor to unifying the experience across the physical, digital, and human worlds …
successor to unifying the experience across the physical, digital, and human worlds …
Honeycomb: Secure and Efficient {GPU} Executions via Static Validation
Graphics Processing Units (GPUs) unlock emerging use cases like large language models
and autonomous driving. They process a large amount of sensitive data, where security is of …
and autonomous driving. They process a large amount of sensitive data, where security is of …
Demystifying the Security Implications in {IoT} Device Rental Services
Y He, Y Guan, R Lun, S Song, Z Guo, J Zhuge… - 33rd USENIX Security …, 2024 - usenix.org
Nowadays, unattended device rental services with cellular IoT controllers, such as e-
scooters and EV chargers, are widely deployed in public areas around the world, offering …
scooters and EV chargers, are widely deployed in public areas around the world, offering …
PDNPulse: Sensing PCB anomaly with the intrinsic power delivery network
The ubiquitous presence of printed circuit boards (PCBs) in modern electronic systems and
embedded devices makes their integrity a top security concern. To take advantage of the …
embedded devices makes their integrity a top security concern. To take advantage of the …
Patching FPGAs: The Security Implications of Bitstream Modifications
Field Programmable Gate Arrays (FPGAs) are known for their reprogrammability that allows
for post-manufacture circuitry changes. Nowadays, they are integral to a variety of systems …
for post-manufacture circuitry changes. Nowadays, they are integral to a variety of systems …
The wiretap channel for capacitive PUF-based security enclosures
K Garb, M Xhemrishi, L Kürzinger, C Frisch - arXiv preprint arXiv …, 2022 - arxiv.org
In order to protect devices from physical manipulations, protective security enclosures were
developed. However, these battery-backed solutions come with a reduced lifetime, and have …
developed. However, these battery-backed solutions come with a reduced lifetime, and have …
Security Analysis of Hidden Analog-Domain Vulnerabilities in Digital Electronic Systems: A Deep Dive into Power Delivery Networks
H Zhu - 2023 - search.proquest.com
Abstract The Power Delivery Network (PDN) is an essential universal sub-system for any
electronic system to operate correctly. Modern electronic systems are growing exponentially …
electronic system to operate correctly. Modern electronic systems are growing exponentially …
[引用][C] Physical systems for integrity protection and authentication
J Tobisch - 2023 - hss-opus.ub.ruhr-unibochum.de
RUB-Repository - Physical systems for integrity protection and authentication Deutsch
OPUS UB Bochum RUB » Bibliotheksportal Home Search Browse Publish FAQ OPUS UB …
OPUS UB Bochum RUB » Bibliotheksportal Home Search Browse Publish FAQ OPUS UB …