Search Results - technology+classifications+%3e+others+%3e+security

16 Results Sort By:
Dynamic Obfuscation Technique for Firmware Protection of Internet-Embedded Systems
Enhances the Security of Internet-of-Things Devices Against Firmware Attacks This obfuscation technique enhances the firmware security of internet-embedded systems in security-critical applications. The number of embedded systems is increasing exponentially globally with the advent of technology and the ever-growing demands for automation. However,...
Published: 5/1/2023   |   Inventor(s): Mark Tehranipoor, Farimah Farahmandi, Fahim Rahman, Muhammad Monir Hossain
Keywords(s):  
Category(s): Technology Classifications > Engineering > Electrical, Technology Classifications, Technology Classifications > Others > Security
Malicious Hardware Detection System to Prevent Information Leakage and System Malfunction
Significantly Improves Detection of Hardware Trojans and Reduces Test Time This malicious hardware detection system identifies hardware Trojans present in system-on-chips that can lead to undesired information leakage and system malfunction. System-on-chips are critical components of nearly all modern electrical systems, and the system-on-chip market...
Published: 6/27/2022   |   Inventor(s): Prabhat Mishra, Jennifer Sheldon, Zhixin Pan
Keywords(s):  
Category(s): Technology Classifications > Engineering > Computer Science, Technology Classifications > Others > Security
Credit Card-Sized Device That Tests for Skimmers in Card Readers
Quickly and Accurately Detects if Card Payment Readers Are Safe to Use Inserting this device into a card reader before you insert your credit card can alert you to the presence of credit card skimmers so you won’t be scammed. Skimmers (and shimmers) are malicious card readers attached to the interior or exterior of the real payment terminal...
Published: 2/21/2022   |   Inventor(s): Patrick Traynor, Christian Peeters, Walter Scaife
Keywords(s):  
Category(s): Technology Classifications > Engineering > Electrical, Technology Classifications > Others > Security
Physical Unclonable Function in FPGAs That Serves as Security Key
Produces Unique Signatures to Serve as a Digital Fingerprint Using Existing Architecture at Little Cost This physical unclonable function (PUF) based authentication and key generation mechanism utilizes the existing reconfigurable logic elements of an FPGA (Field-Programmable Gate Array) to enhance a device's security. An FPGA facilitates reconfiguring...
Published: 6/8/2023   |   Inventor(s): Swarup Bhunia, Christopher Vega, Shubhra Deb Paul
Keywords(s):  
Category(s): Technology Classifications > Engineering > Computer Science, Technology Classifications > Engineering > Electrical, Technology Classifications > Others > Security
Integrated Circuit Camouflaging to Protect Intellectual Property
Covert Gates Based on Doping and Dummy Contacts This cell camouflaging design leverages doping and dummy contacts to create camouflaged cells indistinguishable from regular standard cells to provide greater protection of integrated circuits in cyber-attacks. Available methods of integrated circuit camouflaging based on standard cells assuming Boolean...
Published: 12/1/2021   |   Inventor(s): Domenic Forte, Mark Tehranipoor, Haoting Shen, Bicky Shakya
Keywords(s):  
Category(s): Technology Classifications > Engineering > Computer Science, Technology Classifications > Others > Security
Smart Transaction Sharding to Increase Efficiency of Blockchain Systems
Optimizes Transaction Placement into Shards to Create More Scalable Blockchains This blockchain technology intelligently groups related transactions into the same shards to minimize cross-shard transactions and increase blockchain performance. The blockchain technology market was valued at $3.4 billion in 2020 and should reach $72 billion by 2027....
Published: 1/3/2023   |   Inventor(s): My Thai, Lan Nguyen, Truc Nguyen, Thang Dinh
Keywords(s):  
Category(s): Technology Classifications > Engineering > Computer Science, Technology Classifications > Others > Security
Smart Films with Photonic Crystal Micropatterns to Prevent Counterfeiting
Programs Hidden Micropatterns into Nanostructured Shape Memory Polymer Films for Computer Science and Anti-Counterfeiting Applications This process creates micropatterns in the nanostructure of smart polymers, forming films that help secure against counterfeiting. Over the past decade there has been a global increase in fraud and sale of counterfeit...
Published: 6/27/2021   |   Inventor(s): Peng Jiang, Calen Leverant, Yifan Zhang
Keywords(s):  
Category(s): Technology Classifications > Engineering > Materials, Technology Classifications > Others > Security
Obscuring High-Frequency Iris Features to Improve Security of Eye Tracking Devices
Security Implementation Protects Users from Secure Authentication Breaches by Hackers This eye scan security feature removes iris signatures from the digital images used in eye-tracking devices. Eye-tracking functionality will enable many features in the next generation of automobiles, educational hardware, and more. Mixed and virtual reality headsets...
Published: 9/2/2021   |   Inventor(s): Eakta Jain, Sanjeev Koppal, Brendan David-John
Keywords(s):  
Category(s): Technology Classifications > Engineering > Computer Science, Technology Classifications > Others > Security
Trust-Aware Routing Protocol Improves Network-On-Chip Performance and Reduces Encryption Demands
Lightweight Routing Mechanism Bypasses Malicious IP Modules to Avoid Retransmission Delays and Use Less Energy This routing protocol calculates the trustworthiness of IP cores in network-on-chip (NoC) systems and makes routing decisions to avoid malicious cores that corrupt transmissions and hamper performance. Many system-on-chip (SoC) designs communicate...
Published: 6/27/2021   |   Inventor(s): Prabhat Mishra, Subodha Charles
Keywords(s):  
Category(s): Technology Classifications > Engineering > Computer Science, Technology Classifications > Others > Security
Maximization of Side-Channel Sensitivity for Trojan Detection
Optimizes Test Generation to Expose Malicious Hardware Modifications During System-on-Chip AnalysisThis test pattern generator improves detection of side-channel signatures caused by hardware Trojans to reveal potential attacks to System-on-Chip (SoC) devices. Detecting hardware Trojans is critical to ensuring the security and trustworthiness of SoC...
Published: 2/24/2023   |   Inventor(s): Prabhat Mishra, Yangdi Lyu
Keywords(s):  
Category(s): Technology Classifications > Engineering > Computer Science, Technology Classifications > Others > Security
1 2