Questions tagged [security]
The security tag has no usage guidance.
112
questions
0
votes
0
answers
71
views
Detection range of unintentional emissions by battery powered video recording devices?
I have read about unintentional radiators, but wonder about what their unwanted emissions detection range can be in low background noise, referring to battery powered motion-sensor activated video ...
0
votes
2
answers
157
views
Why does a slightly out of specs power supply works and what are the possible consequences? [closed]
I have the following lamp:
Its power supply is rated at 5.6V and 2.68A blew up some time ago.
I then went to an electronics shop where I've been suggested that I could replace it by a universal power ...
0
votes
1
answer
134
views
Thunderstorm reseting my micro-controller
I think this is a follow up from my previous question. If not then please ignore it.
I have created a very basic (crude) alarm system that uses a reed switch. Luckily there was a thunderstorm and some ...
-1
votes
1
answer
39
views
Can a USB key data be erased by a upsurge in the voltage?
Say I want to design a USB key that would hold personal information. And I want to have a kill switch that would make the NAND memories just destroy or change status instantly by an upsurge of voltage....
2
votes
2
answers
3k
views
Building a simple microphone jammer
A microphone jammer is a device that broadcasts ultrasound waves and, due to the non-linearity of mic amplifiers in small gadgets (i.e. smartphones) it overwhelms the microphone so the only sound the ...
0
votes
1
answer
636
views
Simple security Alarm incorrect schematic diagram
I am a student and my Applied Physics teacher gave an assignment to create a schematic diagram of a security alarm. The main Components are,
Switch (Simple on/off)
SCR C106B (Silicon Controlled ...
0
votes
1
answer
141
views
electric bedroom heated mattress vs danger
We have one 220v electric bedroom heated mattress which repaired by ordinary repairman and changed its board, the circuit is this kind:
And the burned spot in the Blanket:
Its used some resistor and ...
1
vote
2
answers
803
views
How do I implement authentication on an embedded device? [closed]
I have been reading a lot about encryption lately but most sources just care about making sure that the connection between two parties is secure. I want to know how I can be sure that the party I am ...
0
votes
0
answers
52
views
Problem with understanding the circuit related to stable matching security
I am trying to understand a circuit used for stable matching. The paper title is:
MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation and is available :
here
I am attaching the ...
2
votes
1
answer
104
views
Hardware Secure Elements
After checking multiple suppliers and reading about HW secure elements, I would like to understand the use of this type of electronic components.
Maybe I´m wrong, but it seems a HW secure element ...
1
vote
1
answer
136
views
Strategy against Side Channel Attack
I am newbie to Hardware Security. While studying Side Channel Attack, I realized that power consumption profile of electronic control unit is a key to encrypt what algorithm runs on it. I thought ...
1
vote
2
answers
872
views
Secure storage of Data in external EEPROM
I am working in designing of a prepaid energy meter.
One of the most things I should store are (private key, credit and cumulative energy).
The private key is stored only once.
The credit and ...
0
votes
1
answer
83
views
Protection against a circuit being closed too long or failing closed
I'm prototyping a device that allows me to electronically open my front door, which it accomplishes by using a relay to close an existing circuit in my house. All I know about this circuit is that it ...
1
vote
1
answer
55
views
Side-channel leakage and instruction types on microcontrollers
Since the end of 90s, it is known that side-channels (e.g. execution time, power consumption, electromagnetic emanations) of computation platforms can be analysed to recover information on data being ...
0
votes
1
answer
97
views
Can an Integrated Circuit ROM ever be secured [closed]
This presentation which includes embedding public asymmetric crypto assets in a micro-controller on chip ROM suggests that there are, but I am sceptical.
Is it the case that there is nothing that can ...