A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives

M Hossain, G Kayas, R Hasan, A Skjellum, S Noor… - Future Internet, 2024‏ - mdpi.com
Driven by the rapid escalation of its utilization, as well as ram** commercialization,
Internet of Things (IoT) devices increasingly face security threats. Apart from denial of …

A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective

HA Abdul-Ghani, D Konstantas - Journal of Sensor and Actuator …, 2019‏ - mdpi.com
As Internet of Things (IoT) involvement increases in our daily lives, several security and
privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …

Exploiting JTAG and its mitigation in IOT: a survey

G Vishwakarma, W Lee - Future Internet, 2018‏ - mdpi.com
Nowadays, companies are heavily investing in the development of “Internet of Things (IoT)”
products. These companies usually and obviously hunt for lucrative business models …

Test versus security: Past and present

J Da Rolt, A Das, G Di Natale, ML Flottes… - … on Emerging topics …, 2014‏ - ieeexplore.ieee.org
Cryptographic circuits need to be protected against side-channel attacks, which target their
physical attributes while the cryptographic algorithm is in execution. There can be various …

Fine-grained access management in reconfigurable scan networks

R Baranowski, MA Kochte… - IEEE Transactions on …, 2015‏ - ieeexplore.ieee.org
Modern very large scale integration designs incorporate a high amount of instrumentation
that supports post-silicon validation and debug, volume test and diagnosis, as well as in …

Security vulnerability analysis of design-for-test exploits for asset protection in SoCs

GK Contreras, A Nahiyan, S Bhunia… - 2017 22nd Asia and …, 2017‏ - ieeexplore.ieee.org
SoCs implementing security modules should be both testable and secure. Oversights in a
design's test structure could expose internal modules creating security vulnerabilities during …

A survey on security threats and countermeasures in IEEE test standards

E Valea, M Da Silva, G Di Natale, ML Flottes… - IEEE Design & …, 2019‏ - hal.science
The growth in complexity of Integrated Circuits (IC) is supported, amongst other factors, by
the development of standardized test infrastructures. The feasibility of both end …

Digital-to-analog hardware Trojan attacks

M Elshamy, G Di Natale, A Sayed… - … on Circuits and …, 2021‏ - ieeexplore.ieee.org
We propose a Hardware Trojan (HT) attack for analog circuits with its key characteristic
being that it cannot be prevented or detected in the analog domain. The HT attack works in …

Hardware Trojan attacks in analog/mixed-signal ICs via the test access mechanism

M Elshamy, G Di Natale, A Pavlidis… - 2020 IEEE European …, 2020‏ - ieeexplore.ieee.org
We present a Hardware Trojan (HT) attack scenario for analog circuits. The characteristic of
this HT is that it does not reside inside the victim analog circuit. Instead, it resides on an …

Echeloned IJTAG data protection

S Kan, J Dworak, JG Dunham - 2016 IEEE Asian Hardware …, 2016‏ - ieeexplore.ieee.org
This paper presents a novel IJTAG-based data protection method that utilizes stream ciphers
and IJTAG topology. The method protects IJTAG data with encryption. It further imposes …