[HTML][HTML] A comprehensive evaluation approach for efficient countermeasure techniques against timing side-channel attack on MPSoC-based IoT using multi-criteria …

AAJ Al-Hchaimi, NB Sulaiman, MAB Mustafa… - Egyptian Informatics …, 2023 - Elsevier
Context Timing side-channel attack countermeasure techniques (TSCA-CTs) evaluation is a
multi-criteria decision-making (MCDM) problem based on different MPSoCs of IoT platform …

IoT smart health security threats

SA Butt, JL Diaz-Martinez, T Jamal, A Ali… - … science and its …, 2019 - ieeexplore.ieee.org
The Internet of things (IoT) is an active area in the current research community due to the
improvement in mobile computing and wireless networks. Currently, the IoT is involved in …

Attacks on cryptosystems implemented via VLSI: A review

MM Sravani, SA Durai - Journal of Information Security and Applications, 2021 - Elsevier
Serious threats to the VLSI crypto devices are posed by the Side Channel Attack (SCA) that
utilizes the devices' SCI (Side Channel Information) to break the entire cryptographic …

Survey on architectural attacks: A unified classification and attack model

T Ghasempouri, J Raik, C Reinbrecht… - ACM Computing …, 2023 - dl.acm.org
According to the World Economic Forum, cyberattacks are considered as one of the most
important sources of risk to companies and institutions worldwide. Attacks can target the …

Era of sentinel tech: Charting hardware security landscapes through post-silicon innovation, threat mitigation and future trajectories

MBR Srinivas, E Konguvel - IEEE Access, 2024 - ieeexplore.ieee.org
To meet the demanding requirements of VLSI design, including improved speed, reduced
power consumption, and compact architectures, various IP cores from trusted and untrusted …

Securing network-on-chips against fault-injection and crypto-analysis attacks via stochastic anonymous routing

A Patooghy, M Hasanzadeh, A Sarihi… - ACM Journal on …, 2023 - dl.acm.org
Network-on-chip (NoC) is widely used as an efficient communication architecture in multi-
core and many-core System-on-chips (SoCs). However, the shared communication …

Towards the formal verification of security properties of a network-on-chip router

J Sepulveda, D Aboul-Hassan, G Sigl… - 2018 IEEE 23rd …, 2018 - ieeexplore.ieee.org
Vulnerabilities and design flaws in Network-on-Chip (NoC) routers can be exploited in order
to spy, modify and constraint the sensitive communication inside the Multi-Processors …

Survey of attacks and defenses against SGX

Y Zhang, M Zhao, T Li, H Han - 2020 IEEE 5th Information …, 2020 - ieeexplore.ieee.org
The great abundance of information brings us convenient life. At the same time, how to
prevent malicious attackers from stealing user data or privacy is a hot and difficult issue in …

Securing network-on-chips via novel anonymous routing

A Sarihi, A Patooghy, M Hasanzadeh… - Proceedings of the 15th …, 2021 - dl.acm.org
Network-on-Chip (NoC) is widely used as an efficient communication architecture in multi-
core and many-core System-on-Chips (SoCs). However, the shared communication …

Security in many-core SoCs leveraged by opaque secure zones

LL Caimi, FG Moraes - 2019 IEEE Computer Society Annual …, 2019 - ieeexplore.ieee.org
This paper presents an original approach to protect the execution of applications with
security constraints in many-core systems. The proposed method includes three defense …