Modern Hardware Security: A Review of Attacks and Countermeasures

J Mishra, SK Sahay - arxiv preprint arxiv:2501.04394, 2025 - arxiv.org
With the exponential rise in the use of cloud services, smart devices, and IoT devices,
advanced cyber attacks have become increasingly sophisticated and ubiquitous …

Lightweight secure-boot architecture for risc-v system-on-chip

J Haj-Yahya, MM Wong, V Pudi… - … on Quality Electronic …, 2019 - ieeexplore.ieee.org
Securing thousands of connected, resource-constrained computing devices is a major
challenge nowadays. Adding to the challenge, third party service providers need regular …

A survey of secure boot schemes for embedded devices

R Wang, Y Yan - 2022 24th International Conference on …, 2022 - ieeexplore.ieee.org
With the rapid development of Internet of things and wireless communication technology,
embedded devices are widely used in every aspect of our daily lives. Due to the lack of built …

A memory hierarchy protected against side-channel attacks

EB Talaki, O Savry, M Bouvier Des Noes, D Hely - Cryptography, 2022 - mdpi.com
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the
most valuable element to protect against information theft. Many first-order side-channel …

Itus: A secure risc-v system-on-chip

VBY Kumar, A Chattopadhyay… - 2019 32nd IEEE …, 2019 - ieeexplore.ieee.org
The rising tide of attacks, in the recent years, against microprocessors and the system-on-
chip (SoC) space as a whole, has led to a growing number of studies into security of SoCs …

Towards designing a secure RISC-V system-on-chip: ITUS

VBY Kumar, S Deb, N Gupta, S Bhasin… - Journal of Hardware and …, 2020 - Springer
A rising tide of exploits, in the recent years, following a steady discovery of the many
vulnerabilities pervasive in modern computing systems has led to a growing number of …

Servas! secure enclaves via risc-v authenticryption shield

S Steinegger, D Schrammel, S Weiser… - … –ESORICS 2021: 26th …, 2021 - Springer
Isolation is a long-standing security challenge. Privilege rings and virtual memory are
increasingly augmented with capabilities, protection keys, and powerful enclaves. Moreover …

Care: Lightweight attack resilient secure boot architecture with onboard recovery for risc-v based soc

A Dave, N Banerjee, C Patel - 2021 22nd International …, 2021 - ieeexplore.ieee.org
Recent technological advancements have proliferated the use of small embedded devices
for collecting, processing, and transferring the security-critical information. The Internet of …

Sracare: Secure remote attestation with code authentication and resilience engine

A Dave, N Banerjee, C Patel - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Recent technological advancements have enabled proliferated use of small embedded and
IoT devices for collecting, processing, and transferring the security-critical information and …

RARES: Runtime Attack Resilient Embedded System Design Using Verified Proof-of-Execution

ADNBC Patel - arxiv preprint arxiv:2305.03266, 2023 - arxiv.org
Modern society is getting accustomed to the Internet of Things (IoT) and Cyber-Physical
Systems (CPS) for a variety of applications that involves security-critical user data and …