An overview of hardware security and trust: Threats, countermeasures, and design tools
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
Device-specific security challenges and solution in IoT edge computing: a review
Rapid growth in IoT technology demands the need for the emergence of new IoT devices.
IoT devices vary in terms of shape, size, storage, battery life, and computational power …
IoT devices vary in terms of shape, size, storage, battery life, and computational power …
Real-time instruction-level verification of remote IoT/CPS devices via side channels
In recent years, with the rise of IoT technology, wireless Cyber-Physical Systems (CPS) have
become widely deployed in critical infrastructure, including power generation, military …
become widely deployed in critical infrastructure, including power generation, military …
Robust hardware trojan detection method by unsupervised learning of electromagnetic signals
D Lee, J Lee, Y Jung, J Kauh… - IEEE Transactions on Very …, 2024 - ieeexplore.ieee.org
This article explores the threat posed by Hardware Trojans (HTs), malicious circuits
clandestinely embedded in hardware akin to software backdoors. Activation by attackers …
clandestinely embedded in hardware akin to software backdoors. Activation by attackers …
EMSim: A Fast Layout Level Electromagnetic Emanation Simulation Framework for High Accuracy Pre-Silicon Verification
Electromagnetic (EM) emanation measurement and evaluation is one important testing for
modern integrated circuits (ICs). Severe electromagnetic interference may degrade the …
modern integrated circuits (ICs). Severe electromagnetic interference may degrade the …
Magtracer: Detecting GPU cryptojacking attacks via magnetic leakage signals
GPU cryptojacking is an attack that hijacks GPU resources of victims for cryptocurrency
mining. Such attack is becoming an emerging threat to both local hosts and cloud platforms …
mining. Such attack is becoming an emerging threat to both local hosts and cloud platforms …
A framework for hardware trojan detection based on contrastive learning
Z Jiang, Q Ding - Scientific Reports, 2024 - nature.com
With the rapid development of the semiconductor industry, Hardware Trojans (HT) as a kind
of malicious function that can be implanted at will in all processes of integrated circuit …
of malicious function that can be implanted at will in all processes of integrated circuit …
EO-Shield: A multi-function protection scheme against side channel and focused ion beam attacks
Smart devices, especially Internet-connected devices, typically incorporate security
protocols and cryptographic algorithms to ensure the control flow integrity and information …
protocols and cryptographic algorithms to ensure the control flow integrity and information …
A Survey of Electromagnetic Radiation Based Hardware Assurance and Reliability Monitoring Methods in Integrated Circuits
Electromagnetic (EM) radiation-based hardware assurance methods are gaining
prominence due to their non-invasive nature of monitoring the chip activity and the potential …
prominence due to their non-invasive nature of monitoring the chip activity and the potential …
: A Shield-Based Protection Scheme Against Both Invasive and Non-Invasive Attacks
Smart devices, especially Internet-connected devices, typically incorporate security
protocols and cryptographic algorithms to ensure the control flow integrity and information …
protocols and cryptographic algorithms to ensure the control flow integrity and information …