Essays about: "Hardware theft"

Showing result 1 - 5 of 7 essays containing the words Hardware theft.

  1. 1. Diverse Double-Compiling to Harden Cryptocurrency Software

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Niklas Rosencrantz; [2023]
    Keywords : Trusting trust; Compiler security; Software Supply Chain; Trojan Horse; Cryptocurrency; Datasäkerhet; kompilator; datavirus; kryptovaluta; Trojansk häst;

    Abstract : A trusting trust attack is a special case of a software supply-chain attack. The project in this report, named diverse double-compiling for cryptocurrency (DDC4CC), demonstrates and explains a defense for cryptocurrency software against trusting trust attacks. READ MORE

  2. 2. Life Cycle Cost of Smart Wayside Object Controller

    University essay from KTH/Spårfordon

    Author : Filipp Zarov; [2021]
    Keywords : railway signalling system; interlocking; hardware; Object Controller; Smart Wayside Object controller; Lifecycle Cost; renewable energy sources; järnvägssignalsystem; ställverk; hårdvara; Utdelar; SWOC; livscykelkostnad; förnybara energikällor;

    Abstract : In a regional railway signalling system, object controllers are the devices responsible for controlling Track Side Equipment and act as interfaces for TSE with the interlocking computer and the Traffic control system. However, associated cabling (signal and power cabling) and civil works pose a major capital investment and it is a source of significant Capital and Operational expenses, particularly in rural areas, where accessibility andconnectivity to power grid and to the interlocking are a problem. READ MORE

  3. 3. An FPGA Implementation of Arbiter PUF with 4x4 Switch Blocks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Can Aknesil; [2020]
    Keywords : ;

    Abstract : Theft of services, private information, and intellectual property have become significant dangers to the general public and industry. Cryptographic algorithms are used for protection against these dangers. All cryptographic algorithms rely on secret keys that should be generated by an unpredictable process and securely stored. READ MORE

  4. 4. Asset Condition Monitoring System : Using IoT and Embedded Technologies

    University essay from Blekinge Tekniska Högskola/Institutionen för tillämpad signalbehandling

    Author : RajaGanapathiNandan Mavuduru; Vikas Reddy Nallamilli; [2019]
    Keywords : Embedded system; Intelligent monitoring; IoT; Smart Box; Real time Tracker; Remote Monitoring; Embedded technologies.;

    Abstract : Global logistics market is expected to reach US$15.5 trillion by 2023 but many companies loss billions of dollars because of improper handling, theft and tracking problems. READ MORE

  5. 5. On Statistical Properties of Arbiter Physical Unclonable Functions

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Phillip Gajland; [2018]
    Keywords : PUF; Boolean function; function distribution; arbiter path; digital fingerprint; secure key storage; cryptography; system security; hardware security.;

    Abstract : The growing interest in the Internet of Things (IoT) has led to predictions claiming that by 2020 we can expect to be surrounded by 50 billion Internet connected devices. With more entry points to a network, adversaries can potentially use IoT devices as a stepping stone for attacking other devices connected to the network or the network itself. READ MORE