Detecting and preventing cyber insider threats: A survey

L Liu, O De Vel, QL Han, J Zhang… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …

Ten years of hardware Trojans: a survey from the attacker's perspective

M Xue, C Gu, W Liu, S Yu… - IET Computers & Digital …, 2020 - Wiley Online Library
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …

Hardware Trojan attacks: Threat analysis and countermeasures

S Bhunia, MS Hsiao, M Banga… - Proceedings of the …, 2014 - ieeexplore.ieee.org
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …

An inside job: Remote power analysis attacks on FPGAs

F Schellenberg, DRE Gnad, A Moradi… - IEEE Design & …, 2021 - ieeexplore.ieee.org
This article presents how programmable resources of an FPGA can be utilized to perform
side-channel attacks and reports practical examples of these attacks.-Rosario Cammarota …

A2: Analog malicious hardware

K Yang, M Hicks, Q Dong, T Austin… - 2016 IEEE symposium …, 2016 - ieeexplore.ieee.org
While the move to smaller transistors has been a boon for performance it has dramatically
increased the cost to fabricate chips using those smaller transistors. This forces the vast …

A survey of hardware trojan taxonomy and detection

M Tehranipoor, F Koushanfar - IEEE design & test of computers, 2010 - ieeexplore.ieee.org
A Survey of Hardware Trojan Taxonomy and Detection Page 1 A Survey of Hardware Trojan
Taxonomy and Detection Mohammad Tehranipoor University of Connecticut Farinaz …

Stuxnet worm impact on industrial cyber-physical system security

S Karnouskos - IECON 2011-37th Annual Conference of the …, 2011 - ieeexplore.ieee.org
Industrial systems consider only partially security, mostly relying on the basis of “isolated”
networks, and controlled access environments. Monitoring and control systems such as …

FANCI: identification of stealthy malicious logic using boolean functional analysis

A Waksman, M Suozzo, S Sethumadhavan - Proceedings of the 2013 …, 2013 - dl.acm.org
Hardware design today bears similarities to software design. Often vendors buy and
integrate code acquired from third-party organizations into their designs, especially in …

OpenPiton: An open source manycore research framework

J Balkind, M McKeown, Y Fu, T Nguyen, Y Zhou… - ACM SIGPLAN …, 2016 - dl.acm.org
Industry is building larger, more complex, manycore processors on the back of strong
institutional knowledge, but academic projects face difficulties in replicating that scale. To …

Hardware Trojan: Threats and emerging solutions

RS Chakraborty, S Narasimhan… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
Malicious modification of hardware during design or fabrication has emerged as a major
security concern. Such tampering (also referred to as Hardware Trojan) causes an …