Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security

A Attkan, V Ranga - Complex & Intelligent Systems, 2022 - Springer
The recent years have garnered huge attention towards the Internet of Things (IoT) because
it enables its consumers to improve their lifestyles and professionally keep up with the …

Ten years of hardware Trojans: a survey from the attacker's perspective

M Xue, C Gu, W Liu, S Yu… - IET Computers & Digital …, 2020 - Wiley Online Library
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …

[PDF][PDF] Complementary dual codes for counter-measures to side-channel attacks.

C Carlet, S Guilley - Adv. Math. Commun., 2016 - researchgate.net
We recall why linear codes with complementary duals (LCD codes) play a role in counter-
measures to passive and active side-channel analyses on embedded cryptosystems. The …

Complementary Dual Codes for Counter-Measures to Side-Channel Attacks.

C Carlet, S Guilley - ICMCTA, 2014 - Springer
We recall why linear codes with complementary duals (LCD codes) play a role in counter-
measures to passive and active side-channel analyses on embedded cryptosystems. The …

A survey on hardware trojan detection techniques

S Bhasin, F Regazzoni - 2015 IEEE International Symposium …, 2015 - ieeexplore.ieee.org
Hardware Trojans recently emerged as a serious issue for computer systems, especially for
those used in critical applications such as medical or military. Trojan proposed so far can …

Survey of recent developments for hardware trojan detection

A Jain, Z Zhou, U Guin - 2021 ieee international symposium on …, 2021 - ieeexplore.ieee.org
The outsourcing of the design and manufacturing of Integrated Circuits (ICs) poses a severe
threat to our critical infrastructures as an adversary can exploit them by bypassing the …

Hardware trojans in chips: A survey for detection and prevention

C Dong, Y Xu, X Liu, F Zhang, G He, Y Chen - Sensors, 2020 - mdpi.com
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …

A high efficiency hardware trojan detection technique based on fast SEM imaging

F Courbon, P Loubet-Moundi… - … Design, Automation & …, 2015 - ieeexplore.ieee.org
In the semiconductor market where more and more companies become fabless, malicious
integrated circuits' modifications are seen as possible threats. Those Hardware Trojans can …

Introduction to hardware Trojan detection methods

J Francq, F Frick - 2015 Design, Automation & Test in Europe …, 2015 - ieeexplore.ieee.org
Hardware Trojans (HTs) are identified as an emerging threat for the integrity of Integrated
Circuits (ICs) and their applications. Attackers attempt to maliciously manipulate the …

Hardware Trojans: current challenges and approaches

N Jacob, D Merli, J Heyszl, G Sigl - IET Computers & Digital …, 2014 - Wiley Online Library
More and more manufacturers outsource parts of the design and fabrication of integrated
circuits (ICs) for cost reduction. Recent publications show that such outsourcing can pose …