A survey of network-on-chip security attacks and countermeasures

S Charles, P Mishra - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
With the advances of chip manufacturing technologies, computer architects have been able
to integrate an increasing number of processors and other heterogeneous components on …

Fuzz, penetration, and ai testing for soc security verification: Challenges and solutions

KZ Azar, MM Hossain, A Vafaei, H Al Shaikh… - Cryptology ePrint …, 2022 - eprint.iacr.org
The ever-increasing usage and application of system-on-chips (SoCs) has resulted in the
tremendous modernization of these architectures. For a modern SoC design, with the …

Divas: An llm-based end-to-end framework for soc security analysis and policy-based protection

S Paria, A Dasgupta, S Bhunia - arXiv preprint arXiv:2308.06932, 2023 - arxiv.org
Securing critical assets in a bus-based System-On-Chip (SoC) is imperative to mitigate
potential vulnerabilities and prevent unauthorized access, ensuring the integrity, availability …

IoTBChain: Adopting Blockchain Technology to Increase PLC Resilience in an IoT Environment

P Schmid, A Schaffhäuser, R Kashef - Information, 2023 - mdpi.com
The networks on a centralized cloud architecture that interconnect Internet of Things (IoT)
gadgets are not limited by national or jurisdictional borders. To ensure the secure sharing of …

Classification of random number generator applications in IoT: A comprehensive taxonomy

K Seyhan, S Akleylek - Journal of Information Security and Applications, 2022 - Elsevier
Randomness is an important issue for Internet of Things (IoT). The need to generate suitable
random numbers for IoT devices with resource and size limitations has emerged due to the …

Securing network-on-chip using incremental cryptography

S Charles, P Mishra - 2020 IEEE Computer Society Annual …, 2020 - ieeexplore.ieee.org
Network-on-chip (NoC) has become the standard communication fabric for on-chip
components in modern System-on-chip (SoC) designs. Since NoC has visibility to all …

SECTAR: Secure NoC using Trojan aware routing

R Manju, A Das, J Jose, P Mishra - 2020 14th IEEE/ACM …, 2020 - ieeexplore.ieee.org
System-on-Chips (SoCs) are designed using different Intellectual Property (IP) blocks from
multiple third-party vendors to reduce design cost while meeting aggressive time-to-market …

Lightweight and trust-aware routing in NoC-based SoCs

S Charles, P Mishra - 2020 IEEE computer society annual …, 2020 - ieeexplore.ieee.org
Increasing System-on-Chip (SoC) design complexity coupled with time-to-market constraints
have motivated manufacturers to integrate several third-party Intellectual Property (IP) cores …

Automated detection of spectre and meltdown attacks using explainable machine learning

Z Pan, P Mishra - … on Hardware Oriented Security and Trust …, 2021 - ieeexplore.ieee.org
Spectre and Meltdown attacks exploit security vulnerabilities of advanced architectural
features to access inherently concealed memory data without authorization. Existing …

Robust and secure quality monitoring for welding through platform-as-a-service: A resistance and submerged arc welding study

P Stavropoulos, A Papacharalampopoulos… - Machines, 2023 - mdpi.com
For smart manufacturing systems, quality monitoring of welding has already started to shift
from empirical modeling to knowledge integration directly from the captured data by utilizing …