[HTML][HTML] A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain
The current advances in the Internet of Things (IoT) and the solutions being offered by this
technology have accounted IoT among the top ten technologies that will transform the global …
technology have accounted IoT among the top ten technologies that will transform the global …
Ten years of hardware Trojans: a survey from the attacker's perspective
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …
reliable and effective defenses, it is important to figure out how hardware Trojans are …
[HTML][HTML] A survey of emerging threats in cybersecurity
The exponential growth of the Internet interconnections has led to a significant growth of
cyber attack incidents often with disastrous and grievous consequences. Malware is the …
cyber attack incidents often with disastrous and grievous consequences. Malware is the …
Hardware Trojan attacks: Threat analysis and countermeasures
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …
the information being processed. The underlying hardware used for information processing …
[BOOK][B] Hardware security: a hands-on learning approach
S Bhunia, MM Tehranipoor - 2018 - books.google.com
Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and
practical overview of hardware security that encompasses all levels of the electronic …
practical overview of hardware security that encompasses all levels of the electronic …
Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis
The hardware Trojan (HT) has become a major threat for the integrated circuit (IC) industry
and supply chain, and has motivated numerous developments of Trojan detection schemes …
and supply chain, and has motivated numerous developments of Trojan detection schemes …
Hardware Trojan detection by multiple-parameter side-channel analysis
Hardware Trojan attack in the form of malicious modification of a design has emerged as a
major security threat. Sidechannel analysis has been investigated as an alternative to …
major security threat. Sidechannel analysis has been investigated as an alternative to …
Hardware security in IoT devices with emphasis on hardware trojans
Security of IoT devices is getting a lot of attention from researchers as they are becoming
prevalent everywhere. However, implementation of hardware security in these devices has …
prevalent everywhere. However, implementation of hardware security in these devices has …
Securing Computer Hardware Using 3D Integrated Circuit ({{{{{IC}}}}}) Technology and Split Manufacturing for Obfuscation
The fabrication of digital Integrated Circuits (ICs) is increasingly outsourced. Given this trend,
security is recognized as an important issue. The threat agent is an attacker at the IC foundry …
security is recognized as an important issue. The threat agent is an attacker at the IC foundry …
MERS: statistical test generation for side-channel analysis based Trojan detection
Hardware Trojan detection has emerged as a critical challenge to ensure security and
trustworthiness of integrated circuits. A vast majority of research efforts in this area has …
trustworthiness of integrated circuits. A vast majority of research efforts in this area has …