An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics

A Sayakkara, NA Le-Khac, M Scanlon - Digital Investigation, 2019 - Elsevier
The increasing prevalence of Internet of Things (IoT) devices has made it inevitable that their
pertinence to digital forensic investigations will increase into the foreseeable future. These …

Screaming channels: When electromagnetic side channels meet radio transceivers

G Camurati, S Poeplau, M Muench, T Hayes… - Proceedings of the …, 2018 - dl.acm.org
This paper presents a new side channel that affects mixed-signal chips used in widespread
wireless communication protocols, such as Bluetooth and WiFi. This increasingly common …

Preventing page faults from telling your secrets

S Shinde, ZL Chua, V Narayanan… - … of the 11th ACM on Asia …, 2016 - dl.acm.org
New hardware primitives such as Intel SGX secure a user-level process in presence of an
untrusted or compromised OS. Such" enclaved execution" systems are vulnerable to several …

Bitwhisper: Covert signaling channel between air-gapped computers using thermal manipulations

M Guri, M Monitz, Y Mirski… - 2015 IEEE 28th Computer …, 2015 - ieeexplore.ieee.org
It has been assumed that the physical separation ('air-gap') of computers provides a reliable
level of security, such that should two adjacent computers become compromised, the covert …

{GSMem}: Data exfiltration from {Air-Gapped} computers over {GSM} frequencies

M Guri, A Kachlon, O Hasson, G Kedma… - 24th USENIX Security …, 2015 - usenix.org
Air-gapped networks are isolated, separated both logically and physically from public
networks. Although the feasibility of invading such systems has been demonstrated in recent …

USBee: Air-gap covert-channel via electromagnetic emission from USB

M Guri, M Monitz, Y Elovici - 2016 14th Annual Conference on …, 2016 - ieeexplore.ieee.org
In recent years researchers have demonstrated how attackers could use USB connectors
implanted with RF transmitters to exfiltrate data from secure, and even air-gapped …

SoK: Design tools for side-channel-aware implementations

I Buhan, L Batina, Y Yarom, P Schaumont - … of the 2022 ACM on Asia …, 2022 - dl.acm.org
Side-channel attacks that leak sensitive information through a computing device's interaction
with its physical environment have proven to be a severe threat to devices' security …

[HTML][HTML] Leveraging electromagnetic side-channel analysis for the investigation of IoT devices

A Sayakkara, NA Le-Khac, M Scanlon - Digital Investigation, 2019 - Elsevier
Abstract Internet of Things (IoT) devices have expanded the horizon of digital forensic
investigations by providing a rich set of new evidence sources. IoT devices includes health …

Design of an intelligent management system for agricultural greenhouses based on the internet of things

Z Li, J Wang, R Higgs, L Zhou… - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
China is a large agricultural country with the largest population in the world. This creates a
high demand for food, which is prompting the study of high quality and high-yielding crops …