An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Device-specific security challenges and solution in IoT edge computing: a review

A Roy, J Kokila, N Ramasubramanian… - The Journal of …, 2023 - Springer
Rapid growth in IoT technology demands the need for the emergence of new IoT devices.
IoT devices vary in terms of shape, size, storage, battery life, and computational power …

Real-time instruction-level verification of remote IoT/CPS devices via side channels

Y Bai, J Park, M Tehranipoor, D Forte - Discover Internet of Things, 2022 - Springer
In recent years, with the rise of IoT technology, wireless Cyber-Physical Systems (CPS) have
become widely deployed in critical infrastructure, including power generation, military …

Robust hardware trojan detection method by unsupervised learning of electromagnetic signals

D Lee, J Lee, Y Jung, J Kauh… - IEEE Transactions on Very …, 2024 - ieeexplore.ieee.org
This article explores the threat posed by Hardware Trojans (HTs), malicious circuits
clandestinely embedded in hardware akin to software backdoors. Activation by attackers …

EMSim: A Fast Layout Level Electromagnetic Emanation Simulation Framework for High Accuracy Pre-Silicon Verification

H Ma, M Panoff, J He, Y Zhao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Electromagnetic (EM) emanation measurement and evaluation is one important testing for
modern integrated circuits (ICs). Severe electromagnetic interference may degrade the …

Magtracer: Detecting GPU cryptojacking attacks via magnetic leakage signals

R Xiao, T Li, S Ramesh, J Han, J Han - Proceedings of the 29th Annual …, 2023 - dl.acm.org
GPU cryptojacking is an attack that hijacks GPU resources of victims for cryptocurrency
mining. Such attack is becoming an emerging threat to both local hosts and cloud platforms …

A framework for hardware trojan detection based on contrastive learning

Z Jiang, Q Ding - Scientific Reports, 2024 - nature.com
With the rapid development of the semiconductor industry, Hardware Trojans (HT) as a kind
of malicious function that can be implanted at will in all processes of integrated circuit …

EO-Shield: A multi-function protection scheme against side channel and focused ion beam attacks

Y Gao, Q Zhang, H Ma, J He, Y Zhao - Proceedings of the 28th Asia and …, 2023 - dl.acm.org
Smart devices, especially Internet-connected devices, typically incorporate security
protocols and cryptographic algorithms to ensure the control flow integrity and information …

A Survey of Electromagnetic Radiation Based Hardware Assurance and Reliability Monitoring Methods in Integrated Circuits

MY Vutukuru, JM Emmert, R Jha - IEEE Access, 2024 - ieeexplore.ieee.org
Electromagnetic (EM) radiation-based hardware assurance methods are gaining
prominence due to their non-invasive nature of monitoring the chip activity and the potential …

: A Shield-Based Protection Scheme Against Both Invasive and Non-Invasive Attacks

Y Gao, Q Zhang, X Song, H Ma, J He… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Smart devices, especially Internet-connected devices, typically incorporate security
protocols and cryptographic algorithms to ensure the control flow integrity and information …