Fuzzing of embedded systems: A survey

J Yun, F Rustamov, J Kim, Y Shin - ACM Computing Surveys, 2022 - dl.acm.org
Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …

Hardware trojans in chips: A survey for detection and prevention

C Dong, Y Xu, X Liu, F Zhang, G He, Y Chen - Sensors, 2020 - mdpi.com
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …

The cybersecurity landscape in industrial control systems

S McLaughlin, C Konstantinou, X Wang… - Proceedings of the …, 2016 - ieeexplore.ieee.org
Industrial control systems (ICSs) are transitioning from legacy-electromechanical-based
systems to modern information and communication technology (ICT)-based systems …

A survey of attacks on controller area networks and corresponding countermeasures

HJ Jo, W Choi - IEEE Transactions on Intelligent Transportation …, 2021 - ieeexplore.ieee.org
The development of vehicle technologies such as connected and autonomous vehicle
environments provide drivers with functions for convenience and safety that are highly …

The big hack explained: Detection and prevention of PCB supply chain implants

D Mehta, H Lu, OP Paradis, MA MS… - ACM Journal on …, 2020 - dl.acm.org
Over the past two decades, globalized outsourcing in the semiconductor supply chain has
lowered manufacturing costs and shortened the time-to-market for original equipment …

A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective

HA Abdul-Ghani, D Konstantas - Journal of Sensor and Actuator …, 2019 - mdpi.com
As Internet of Things (IoT) involvement increases in our daily lives, several security and
privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …

Secure scan and test using obfuscation throughout supply chain

X Wang, D Zhang, M He, D Su… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Scan-based test is commonly used to increase testability and fault coverage, however, it is
also known to be a liability for chip security. Research has shown that intellectual property …

Trust in FPGA-accelerated cloud computing

F Turan, I Verbauwhede - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Platforms combining Central Processing Systems (CPUs) with Field Programmable Gate
Arrays (FPGAs) have become popular, as they promise high performance with energy …

Test versus security: Past and present

J Da Rolt, A Das, G Di Natale, ML Flottes… - … on Emerging topics …, 2014 - ieeexplore.ieee.org
Cryptographic circuits need to be protected against side-channel attacks, which target their
physical attributes while the cryptographic algorithm is in execution. There can be various …

On malicious implants in PCBs throughout the supply chain

J Harrison, N Asadizanjani, M Tehranipoor - Integration, 2021 - Elsevier
The PCB supply chain has become globally distributed such that PCBs are vulnerable to
hardware Trojan attacks. Moreover, attacks on PCBs are possible even after a system is …