Side-channel attacks: Ten years after its publication and the impacts on cryptographic module security testing

YB Zhou, DG Feng - Cryptology ePrint Archive, 2005 - eprint.iacr.org
Side-channel attacks are easy-to-implement whilst powerful attacks against cryptographic
implementations, and their targets range from primitives, protocols, modules, and devices to …

C-FLAT: control-flow attestation for embedded systems software

T Abera, N Asokan, L Davi, JE Ekberg… - Proceedings of the …, 2016 - dl.acm.org
Remote attestation is a crucial security service particularly relevant to increasingly popular
IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a …

[KSIĄŻKA][B] Embedded system design: embedded systems foundations of cyber-physical systems, and the internet of things

P Marwedel - 2021 - library.oapen.org
A unique feature of this open access textbook is to provide a comprehensive introduction to
the fundamental knowledge in embedded systems, with applications in cyber-physical …

Cyber-physical systems security: a systematic map** study

YZ Lun, A D'Innocenzo, I Malavolta… - arxiv preprint arxiv …, 2016 - arxiv.org
Cyber-physical systems are integrations of computation, networking, and physical
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …

New cache designs for thwarting software cache-based side channel attacks

Z Wang, RB Lee - Proceedings of the 34th annual international …, 2007 - dl.acm.org
Software cache-based side channel attacks are a serious new class of threats for computers.
Unlike physical side channel attacks that mostly target embedded cryptographic devices …

Embedded systems security: Threats, vulnerabilities, and attack taxonomy

D Papp, Z Ma, L Buttyan - … on Privacy, Security and Trust (PST), 2015 - ieeexplore.ieee.org
Embedded systems are the driving force for technological development in many domains
such as automotive, healthcare, and industrial control in the emerging post-PC era. As more …

Proposed security model and threat taxonomy for the Internet of Things (IoT)

S Babar, P Mahalle, A Stango, N Prasad… - … Conference on Network …, 2010 - Springer
IoT is an intelligent collaboration of tiny sensors and devices giving new challenges to
security and privacy in end to end communication of things. Protection of data and privacy of …

Security in embedded systems: Design challenges

S Ravi, A Raghunathan, P Kocher… - ACM Transactions on …, 2004 - dl.acm.org
Many modern electronic systems---including personal computers, PDAs, cell phones,
network routers, smart cards, and networked sensors to name a few---need to access, store …

Security aspects of the in-vehicle network in the connected car

P Kleberger, T Olovsson… - 2011 IEEE intelligent …, 2011 - ieeexplore.ieee.org
In this paper, we briefly survey the research with respect to the security of the connected car,
and in particular its in-vehicle network. The aim is to highlight the current state of the …

[KSIĄŻKA][B] On-chip communication architectures: system on chip interconnect

S Pasricha, N Dutt - 2010 - books.google.com
Over the past decade, system-on-chip (SoC) designs have evolved to address the ever
increasing complexity of applications, fueled by the era of digital convergence …