Security threat mitigation for smart contracts: A comprehensive survey
The blockchain technology, initially created for cryptocurrency, has been re-purposed for
recording state transitions of smart contracts—decentralized applications that can be …
recording state transitions of smart contracts—decentralized applications that can be …
A survey on hardware security: Current trends and challenges
Hardware security has become a critical concern due to the globalization of the Integrated
Circuit (IC) supply chain and the complex network connections of computing-intensive …
Circuit (IC) supply chain and the complex network connections of computing-intensive …
A comprehensive survey on social engineering attacks, countermeasures, case study, and research challenges
Social engineering attacks are inevitable and imperil the integrity, security, and
confidentiality of the information used on social media platforms. Prominent technologies …
confidentiality of the information used on social media platforms. Prominent technologies …
Exploring Classic Security Attacks and Hardware Intricacies
This chapter explores classic security attacks on hardware systems, focusing on
vulnerabilities stemming from common practices in hardware design and manufacturing. It …
vulnerabilities stemming from common practices in hardware design and manufacturing. It …