Hardware trojans in chips: A survey for detection and prevention
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
Hardware security of fog end-devices for the internet of things
The proliferation of the Internet of Things (IoT) caused new application needs to emerge as
rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing …
rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing …
A survey on security issues in services communication of Microservices‐enabled fog applications
Fog computing is used as a popular extension of cloud computing for a variety of emerging
applications. To incorporate various design choices and customized policies in fog …
applications. To incorporate various design choices and customized policies in fog …
Evaluation approach for efficient countermeasure techniques against denial-of-service attack on MPSoC-based IoT using multi-criteria decision-making
AAJ Al-Hchaimi, NB Sulaiman, MAB Mustafa… - IEEE …, 2022 - ieeexplore.ieee.org
Context: Denial-of-Service Attack countermeasure techniques (DoS A-CTs) evaluation is a
Multi-criteria decision-making (MCDM) problem based on different MPSoCs of IoT platform …
Multi-criteria decision-making (MCDM) problem based on different MPSoCs of IoT platform …
SECTAR: Secure NoC using Trojan aware routing
System-on-Chips (SoCs) are designed using different Intellectual Property (IP) blocks from
multiple third-party vendors to reduce design cost while meeting aggressive time-to-market …
multiple third-party vendors to reduce design cost while meeting aggressive time-to-market …
Packet header attack by hardware trojan in NoC based TCMP and its impact analysis
With the advancement of VLSI technology, Tiled Chip Multicore Processors (TCMP) with
packet switched Network-on-Chip (NoC) have been emerged as the backbone of the …
packet switched Network-on-Chip (NoC) have been emerged as the backbone of the …
EETD: An energy efficient design for runtime hardware trojan detection in untrusted network-on-chip
Network-on-chip (NoC) is a communication intellectual property (IP) core, popularly used in
the system-on-a-chip (SoC) designs. The NoC IP core often comes from an untrusted 3rd …
the system-on-a-chip (SoC) designs. The NoC IP core often comes from an untrusted 3rd …
Dead flit attack on noc by hardware trojan and its impact analysis
With the advancement in VLSI technology, Tiled Chip Multicore Processors (TCMPs) with
packet switched Network-on-Chip (NoC) have emerged as the most popular design choice …
packet switched Network-on-Chip (NoC) have emerged as the most popular design choice …
Security of Electrical, Optical, and Wireless On-chip Interconnects: A Survey
H Weerasena, P Mishra - ACM Transactions on Design Automation of …, 2024 - dl.acm.org
The advancement of manufacturing technologies has enabled the integration of more
intellectual property (IP) cores on the same system-on-chip (SoC). Scalable and high …
intellectual property (IP) cores on the same system-on-chip (SoC). Scalable and high …
Analysis of black hole router attack in network-on-chip
Network-on-Chip (NoC) is the communication platform of the data among the processing
cores in Multiprocessors System-on-Chip (MPSoC). NoC has become a target to security …
cores in Multiprocessors System-on-Chip (MPSoC). NoC has become a target to security …