Blockchain-assisted UAV communication systems: A comprehensive survey

S Hafeez, AR Khan, MM Al-Quraan… - IEEE Open Journal …, 2023 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) have recently established their capacity to provide cost-
effective and credible solutions for various real-world scenarios. UAVs provide an immense …

Hardware trust and assurance through reverse engineering: A tutorial and outlook from image analysis and machine learning perspectives

UJ Botero, R Wilson, H Lu, MT Rahman… - ACM Journal on …, 2021 - dl.acm.org
In the context of hardware trust and assurance, reverse engineering has been often
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …

A survey on security and privacy issues of UAVs

Y Mekdad, A Aris, L Babun, A El Fergougui, M Conti… - Computer Networks, 2023 - Elsevier
In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs),
has witnessed a rapid increase with its large number of airspace users. The tremendous …

Hal—the missing piece of the puzzle for hardware reverse engineering, trojan detection and insertion

M Fyrbiak, S Wallat, P Swierczynski… - … on Dependable and …, 2018 - ieeexplore.ieee.org
Hardware manipulations pose a serious threat to numerous systems, ranging from a myriad
of smart-X devices to military systems. In many attack scenarios an adversary merely has …

A survey on hardware vulnerability analysis using machine learning

Z Pan, P Mishra - IEEE Access, 2022 - ieeexplore.ieee.org
Electronic systems rely on efficient hardware, popularly known as system-on-chip (SoC), to
support its core functionalities. A typical SoC consists of diverse components gathered from …

On the difficulty of FSM-based hardware obfuscation

M Fyrbiak, S Wallat, J Déchelotte, N Albartus… - IACR Transactions on …, 2018 - tches.iacr.org
Abstract In today's Integrated Circuit (IC) production chains, a designer's valuable
Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to …

A survey of algorithmic methods in IC reverse engineering

L Azriel, J Speith, N Albartus, R Ginosar… - Journal of Cryptographic …, 2021 - Springer
The discipline of reverse engineering integrated circuits (ICs) is as old as the technology
itself. It grew out of the need to analyze competitor's products and detect possible IP …

Dana-universal dataflow analysis for gate-level netlist reverse engineering

N Albartus, M Hoffmann, S Temme, L Azriel… - Cryptology ePrint …, 2020 - eprint.iacr.org
Reverse engineering of integrated circuits, ie, understanding the internals of IC, is required
for many benign and malicious applications. Examples of the former are detection of patent …

Graph similarity and its applications to hardware security

M Fyrbiak, S Wallat, S Reinhard… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Hardware reverse engineering is a powerful and universal tool for both security engineers
and adversaries. From a defensive perspective, it allows for detection of intellectual property …

[HTML][HTML] A survey on security analysis of machine learning-oriented hardware and software intellectual property

A Tauhid, L Xu, M Rahman, E Tomai - High-Confidence Computing, 2023 - Elsevier
Intellectual Property (IP) includes ideas, innovations, methodologies, works of authorship
(viz., literary and artistic works), emblems, brands, images, etc. This property is intangible …