Modern Hardware Security: A Review of Attacks and Countermeasures
J Mishra, SK Sahay - arxiv preprint arxiv:2501.04394, 2025 - arxiv.org
With the exponential rise in the use of cloud services, smart devices, and IoT devices,
advanced cyber attacks have become increasingly sophisticated and ubiquitous …
advanced cyber attacks have become increasingly sophisticated and ubiquitous …
Lightweight secure-boot architecture for risc-v system-on-chip
Securing thousands of connected, resource-constrained computing devices is a major
challenge nowadays. Adding to the challenge, third party service providers need regular …
challenge nowadays. Adding to the challenge, third party service providers need regular …
A survey of secure boot schemes for embedded devices
R Wang, Y Yan - 2022 24th International Conference on …, 2022 - ieeexplore.ieee.org
With the rapid development of Internet of things and wireless communication technology,
embedded devices are widely used in every aspect of our daily lives. Due to the lack of built …
embedded devices are widely used in every aspect of our daily lives. Due to the lack of built …
A memory hierarchy protected against side-channel attacks
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the
most valuable element to protect against information theft. Many first-order side-channel …
most valuable element to protect against information theft. Many first-order side-channel …
Itus: A secure risc-v system-on-chip
The rising tide of attacks, in the recent years, against microprocessors and the system-on-
chip (SoC) space as a whole, has led to a growing number of studies into security of SoCs …
chip (SoC) space as a whole, has led to a growing number of studies into security of SoCs …
Towards designing a secure RISC-V system-on-chip: ITUS
A rising tide of exploits, in the recent years, following a steady discovery of the many
vulnerabilities pervasive in modern computing systems has led to a growing number of …
vulnerabilities pervasive in modern computing systems has led to a growing number of …
Servas! secure enclaves via risc-v authenticryption shield
S Steinegger, D Schrammel, S Weiser… - … –ESORICS 2021: 26th …, 2021 - Springer
Isolation is a long-standing security challenge. Privilege rings and virtual memory are
increasingly augmented with capabilities, protection keys, and powerful enclaves. Moreover …
increasingly augmented with capabilities, protection keys, and powerful enclaves. Moreover …
Care: Lightweight attack resilient secure boot architecture with onboard recovery for risc-v based soc
Recent technological advancements have proliferated the use of small embedded devices
for collecting, processing, and transferring the security-critical information. The Internet of …
for collecting, processing, and transferring the security-critical information. The Internet of …
Sracare: Secure remote attestation with code authentication and resilience engine
Recent technological advancements have enabled proliferated use of small embedded and
IoT devices for collecting, processing, and transferring the security-critical information and …
IoT devices for collecting, processing, and transferring the security-critical information and …
RARES: Runtime Attack Resilient Embedded System Design Using Verified Proof-of-Execution
ADNBC Patel - arxiv preprint arxiv:2305.03266, 2023 - arxiv.org
Modern society is getting accustomed to the Internet of Things (IoT) and Cyber-Physical
Systems (CPS) for a variety of applications that involves security-critical user data and …
Systems (CPS) for a variety of applications that involves security-critical user data and …