Please note, we are currently updating the 2018 Journal Metrics. This journal spans topics related to electronic hardware and systems security. Coverage encompasses all application domains, including embedded systems, cyber-physical systems, The Internet of Things, reconfigurable systems, and biomedical systems including implants and wearable devices. The journal examines the interaction of hardware and systems, and the interaction between hardware and firmware/software as these relate to system security and trust. Among the topics covered are Cyber Physical Systems and Embedded systems security; Design for Security of electronic hardware; Security analysis and the protection of printed circuit boards and security or the Internet of Things; Side-channel attacks (SCA) and protection; Security, privacy, and trust protocols; Security analysis of track and trace technologies for various supply chains including electronics, food, medicine and more.
Journal of Hardware and Systems Security
Description
Identifiers
ISSN | 2509-3428 |
e-ISSN | 2509-3436 |
Publisher
Springer International Publishing
Additional information
Data set: Springer
Articles
Journal of Hardware and Systems Security > 2019 > 3 > 3 > 219-234
Over the last two decades, side and covert channel research has shown a variety of ways of exfiltrating information for a computer system. Processor microarchitectural timing-based side and covert channel attacks have emerged as some of the most clever attacks, and ones which are difficult to deal with, without impacting system performance. Unlike electromagnetic or power-based channels, microarchitectural...
Journal of Hardware and Systems Security > 2019 > 3 > 3 > 289-303
As the vehicles are gradually transformed into the connected-vehicles, standard features of the past (i.e., immobilizer, keyless entry, self-diagnostics) were neglected to be software updated and hardware upgraded so they do not “align” with the cyber-security demands of the new ICT era (IoT, Industry 4.0, IPv6, sensor technology) we have stepped into, therefore introducing critical legacy IT security...