Fuzzing of embedded systems: A survey
Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …
Hardware trojans in chips: A survey for detection and prevention
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
The cybersecurity landscape in industrial control systems
Industrial control systems (ICSs) are transitioning from legacy-electromechanical-based
systems to modern information and communication technology (ICT)-based systems …
systems to modern information and communication technology (ICT)-based systems …
A survey of attacks on controller area networks and corresponding countermeasures
HJ Jo, W Choi - IEEE Transactions on Intelligent Transportation …, 2021 - ieeexplore.ieee.org
The development of vehicle technologies such as connected and autonomous vehicle
environments provide drivers with functions for convenience and safety that are highly …
environments provide drivers with functions for convenience and safety that are highly …
The big hack explained: Detection and prevention of PCB supply chain implants
Over the past two decades, globalized outsourcing in the semiconductor supply chain has
lowered manufacturing costs and shortened the time-to-market for original equipment …
lowered manufacturing costs and shortened the time-to-market for original equipment …
A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective
HA Abdul-Ghani, D Konstantas - Journal of Sensor and Actuator …, 2019 - mdpi.com
As Internet of Things (IoT) involvement increases in our daily lives, several security and
privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …
privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …
Secure scan and test using obfuscation throughout supply chain
Scan-based test is commonly used to increase testability and fault coverage, however, it is
also known to be a liability for chip security. Research has shown that intellectual property …
also known to be a liability for chip security. Research has shown that intellectual property …
Trust in FPGA-accelerated cloud computing
F Turan, I Verbauwhede - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Platforms combining Central Processing Systems (CPUs) with Field Programmable Gate
Arrays (FPGAs) have become popular, as they promise high performance with energy …
Arrays (FPGAs) have become popular, as they promise high performance with energy …
Test versus security: Past and present
Cryptographic circuits need to be protected against side-channel attacks, which target their
physical attributes while the cryptographic algorithm is in execution. There can be various …
physical attributes while the cryptographic algorithm is in execution. There can be various …
On malicious implants in PCBs throughout the supply chain
J Harrison, N Asadizanjani, M Tehranipoor - Integration, 2021 - Elsevier
The PCB supply chain has become globally distributed such that PCBs are vulnerable to
hardware Trojan attacks. Moreover, attacks on PCBs are possible even after a system is …
hardware Trojan attacks. Moreover, attacks on PCBs are possible even after a system is …