Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
The recent years have garnered huge attention towards the Internet of Things (IoT) because
it enables its consumers to improve their lifestyles and professionally keep up with the …
it enables its consumers to improve their lifestyles and professionally keep up with the …
Ten years of hardware Trojans: a survey from the attacker's perspective
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …
reliable and effective defenses, it is important to figure out how hardware Trojans are …
[PDF][PDF] Complementary dual codes for counter-measures to side-channel attacks.
We recall why linear codes with complementary duals (LCD codes) play a role in counter-
measures to passive and active side-channel analyses on embedded cryptosystems. The …
measures to passive and active side-channel analyses on embedded cryptosystems. The …
Complementary Dual Codes for Counter-Measures to Side-Channel Attacks.
We recall why linear codes with complementary duals (LCD codes) play a role in counter-
measures to passive and active side-channel analyses on embedded cryptosystems. The …
measures to passive and active side-channel analyses on embedded cryptosystems. The …
A survey on hardware trojan detection techniques
Hardware Trojans recently emerged as a serious issue for computer systems, especially for
those used in critical applications such as medical or military. Trojan proposed so far can …
those used in critical applications such as medical or military. Trojan proposed so far can …
Survey of recent developments for hardware trojan detection
The outsourcing of the design and manufacturing of Integrated Circuits (ICs) poses a severe
threat to our critical infrastructures as an adversary can exploit them by bypassing the …
threat to our critical infrastructures as an adversary can exploit them by bypassing the …
Hardware trojans in chips: A survey for detection and prevention
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
A high efficiency hardware trojan detection technique based on fast SEM imaging
In the semiconductor market where more and more companies become fabless, malicious
integrated circuits' modifications are seen as possible threats. Those Hardware Trojans can …
integrated circuits' modifications are seen as possible threats. Those Hardware Trojans can …
Introduction to hardware Trojan detection methods
J Francq, F Frick - 2015 Design, Automation & Test in Europe …, 2015 - ieeexplore.ieee.org
Hardware Trojans (HTs) are identified as an emerging threat for the integrity of Integrated
Circuits (ICs) and their applications. Attackers attempt to maliciously manipulate the …
Circuits (ICs) and their applications. Attackers attempt to maliciously manipulate the …
Hardware Trojans: current challenges and approaches
More and more manufacturers outsource parts of the design and fabrication of integrated
circuits (ICs) for cost reduction. Recent publications show that such outsourcing can pose …
circuits (ICs) for cost reduction. Recent publications show that such outsourcing can pose …