A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions
Internet usage has grown exponentially, with individuals and companies performing multiple
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …
An overview of hardware security and trust: Threats, countermeasures, and design tools
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
Provably-secure logic locking: From theory to practice
Logic locking has been conceived as a promising proactive defense strategy against
intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and …
intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and …
Hardware trojans: Lessons learned after one decade of research
Given the increasing complexity of modern electronics and the cost of fabrication, entities
from around the globe have become more heavily involved in all phases of the electronics …
from around the globe have become more heavily involved in all phases of the electronics …
[HTML][HTML] A survey of emerging threats in cybersecurity
J Jang-Jaccard, S Nepal - Journal of computer and system sciences, 2014 - Elsevier
The exponential growth of the Internet interconnections has led to a significant growth of
cyber attack incidents often with disastrous and grievous consequences. Malware is the …
cyber attack incidents often with disastrous and grievous consequences. Malware is the …
Hardware Trojan attacks: Threat analysis and countermeasures
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …
the information being processed. The underlying hardware used for information processing …
A survey on physical unclonable function (PUF)-based security solutions for Internet of Things
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …
and so on represent a thriving surface for several security attacks with economic …
SARLock: SAT attack resistant logic locking
Logic locking is an Intellectual Property (IP) protection technique that thwarts IP piracy,
hardware Trojans, reverse engineering, and IC overproduction. Researchers have taken …
hardware Trojans, reverse engineering, and IC overproduction. Researchers have taken …
A primer on hardware security: Models, methods, and metrics
The multinational, distributed, and multistep nature of integrated circuit (IC) production
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …
On improving the security of logic locking
Due to globalization of integrated circuit (IC) design flow, rogue elements in the supply chain
can pirate ICs, overbuild ICs, and insert hardware Trojans. EPIC locks the design by …
can pirate ICs, overbuild ICs, and insert hardware Trojans. EPIC locks the design by …