Hardware trojans in chips: A survey for detection and prevention

C Dong, Y Xu, X Liu, F Zhang, G He, Y Chen - Sensors, 2020 - mdpi.com
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …

Hardware security of fog end-devices for the internet of things

I Butun, A Sari, P Österberg - Sensors, 2020 - mdpi.com
The proliferation of the Internet of Things (IoT) caused new application needs to emerge as
rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing …

A survey on security issues in services communication of Microservices‐enabled fog applications

D Yu, Y Jin, Y Zhang, X Zheng - Concurrency and Computation …, 2019 - Wiley Online Library
Fog computing is used as a popular extension of cloud computing for a variety of emerging
applications. To incorporate various design choices and customized policies in fog …

Evaluation approach for efficient countermeasure techniques against denial-of-service attack on MPSoC-based IoT using multi-criteria decision-making

AAJ Al-Hchaimi, NB Sulaiman, MAB Mustafa… - IEEE …, 2022 - ieeexplore.ieee.org
Context: Denial-of-Service Attack countermeasure techniques (DoS A-CTs) evaluation is a
Multi-criteria decision-making (MCDM) problem based on different MPSoCs of IoT platform …

SECTAR: Secure NoC using Trojan aware routing

R Manju, A Das, J Jose, P Mishra - 2020 14th IEEE/ACM …, 2020 - ieeexplore.ieee.org
System-on-Chips (SoCs) are designed using different Intellectual Property (IP) blocks from
multiple third-party vendors to reduce design cost while meeting aggressive time-to-market …

Packet header attack by hardware trojan in NoC based TCMP and its impact analysis

VJ Kulkarni, R Manju, R Gupta, J Jose… - Proceedings of the 15th …, 2021 - dl.acm.org
With the advancement of VLSI technology, Tiled Chip Multicore Processors (TCMP) with
packet switched Network-on-Chip (NoC) have been emerged as the backbone of the …

EETD: An energy efficient design for runtime hardware trojan detection in untrusted network-on-chip

M Hussain, A Malekpour, H Guo… - 2018 IEEE Computer …, 2018 - ieeexplore.ieee.org
Network-on-chip (NoC) is a communication intellectual property (IP) core, popularly used in
the system-on-a-chip (SoC) designs. The NoC IP core often comes from an untrusted 3rd …

Dead flit attack on noc by hardware trojan and its impact analysis

MH Khan, R Gupta, J Jose, S Nandi - Proceedings of the 14th …, 2021 - dl.acm.org
With the advancement in VLSI technology, Tiled Chip Multicore Processors (TCMPs) with
packet switched Network-on-Chip (NoC) have emerged as the most popular design choice …

Security of Electrical, Optical, and Wireless On-chip Interconnects: A Survey

H Weerasena, P Mishra - ACM Transactions on Design Automation of …, 2024 - dl.acm.org
The advancement of manufacturing technologies has enabled the integration of more
intellectual property (IP) cores on the same system-on-chip (SoC). Scalable and high …

Analysis of black hole router attack in network-on-chip

L Daoud, N Rafla - 2019 IEEE 62nd International Midwest …, 2019 - ieeexplore.ieee.org
Network-on-Chip (NoC) is the communication platform of the data among the processing
cores in Multiprocessors System-on-Chip (MPSoC). NoC has become a target to security …