A comprehensive survey of hardware-assisted security: From the edge to the cloud

L Coppolino, S D'Antonio, G Mazzeo, L Romano - Internet of Things, 2019 - Elsevier
Sensitive data processing occurs more and more on machines or devices out of users
control. In the Internet of Things world, for example, the security of data could be posed at …

[图书][B] Emerging topics in hardware security

M Tehranipoor - 2021 - Springer
Hardware security, so unknown to many in the domain of cyber security over the past four
decades, has now become a household terminology in many organizations, companies, and …

[HTML][HTML] Introduction to hardware security

Y Jin - Electronics, 2015 - mdpi.com
Hardware security has become a hot topic recently with more and more researchers from
related research domains joining this area. However, the understanding of hardware …

Hardware and embedded security in the context of internet of things

A Kanuparthi, R Karri, S Addepalli - … of the 2013 ACM workshop on …, 2013 - dl.acm.org
Internet of Things (IoT) is the interconnection of a large number of resource-constrained
devices such as sensors, actuators, and nodes that generate large volumes of data which …

A survey on hardware security: Current trends and challenges

S Akter, K Khalil, M Bayoumi - IEEE Access, 2023 - ieeexplore.ieee.org
Hardware security has become a critical concern due to the globalization of the Integrated
Circuit (IC) supply chain and the complex network connections of computing-intensive …

[HTML][HTML] Hardware-enhanced protection for the runtime data security in embedded systems

W Wang, X Zhang, Q Hao, Z Zhang, B Xu, H Dong… - Electronics, 2019 - mdpi.com
At present, the embedded systems are facing various kinds of attacks, especially for the data
stored in the external memories. This paper presents a hardware-enhanced protection …

[图书][B] The craft of system security

S Smith, J Marchesini - 2007 - books.google.com
" I believe The Craft of System Security is one of the best software security books on the
market today. It has not only breadth, but depth, covering topics ranging from cryptography …

Hardware-based solutions for trusted cloud computing

O Demigha, R Larguet - Computers & Security, 2021 - Elsevier
The increasing number of threats targeting cloud computing and the exploitation of
specifically privileged software vulnerabilities have pushed the security managers of cloud …

DisARM: mitigating buffer overflow attacks on embedded devices

J Habibi, A Panicker, A Gupta, E Bertino - … , NSS 2015, New York, NY, USA …, 2015 - Springer
Security of embedded devices today is a critical requirement for the Internet of Things (IoT)
as these devices will access sensitive information such as social security numbers and …

Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020 - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …