—It is a fact that vast majority of attention is given to protecting against external threats, which are considered more dangerous. However, some industrial surveys have indicate...
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM sealing mechanism. BitLocker is a disk encryption feature included in some ver...
This paper presents a concurrent error detection technique targeted towards control logic in a processor with emphasis on low area overhead. Rather than detect all modeled transie...
Ramtilak Vemu, Abhijit Jas, Jacob A. Abraham, Srin...
Security aspects of today’s automation systems gain increasing importance. One critical point regarding security is the exchange of control data over the network. Recently, cryp...
Wolfgang Granzer, Christian Reinisch, Wolfgang Kas...
The progress of future e-business and ecommerce will depend on the ability of our legal institutions to protect general users from cyber crimes. While there has been substantial p...