A survey of network-on-chip security attacks and countermeasures
With the advances of chip manufacturing technologies, computer architects have been able
to integrate an increasing number of processors and other heterogeneous components on …
to integrate an increasing number of processors and other heterogeneous components on …
Fuzz, penetration, and ai testing for soc security verification: Challenges and solutions
The ever-increasing usage and application of system-on-chips (SoCs) has resulted in the
tremendous modernization of these architectures. For a modern SoC design, with the …
tremendous modernization of these architectures. For a modern SoC design, with the …
Divas: An llm-based end-to-end framework for soc security analysis and policy-based protection
Securing critical assets in a bus-based System-On-Chip (SoC) is imperative to mitigate
potential vulnerabilities and prevent unauthorized access, ensuring the integrity, availability …
potential vulnerabilities and prevent unauthorized access, ensuring the integrity, availability …
IoTBChain: Adopting Blockchain Technology to Increase PLC Resilience in an IoT Environment
The networks on a centralized cloud architecture that interconnect Internet of Things (IoT)
gadgets are not limited by national or jurisdictional borders. To ensure the secure sharing of …
gadgets are not limited by national or jurisdictional borders. To ensure the secure sharing of …
Classification of random number generator applications in IoT: A comprehensive taxonomy
K Seyhan, S Akleylek - Journal of Information Security and Applications, 2022 - Elsevier
Randomness is an important issue for Internet of Things (IoT). The need to generate suitable
random numbers for IoT devices with resource and size limitations has emerged due to the …
random numbers for IoT devices with resource and size limitations has emerged due to the …
Securing network-on-chip using incremental cryptography
Network-on-chip (NoC) has become the standard communication fabric for on-chip
components in modern System-on-chip (SoC) designs. Since NoC has visibility to all …
components in modern System-on-chip (SoC) designs. Since NoC has visibility to all …
SECTAR: Secure NoC using Trojan aware routing
System-on-Chips (SoCs) are designed using different Intellectual Property (IP) blocks from
multiple third-party vendors to reduce design cost while meeting aggressive time-to-market …
multiple third-party vendors to reduce design cost while meeting aggressive time-to-market …
Lightweight and trust-aware routing in NoC-based SoCs
Increasing System-on-Chip (SoC) design complexity coupled with time-to-market constraints
have motivated manufacturers to integrate several third-party Intellectual Property (IP) cores …
have motivated manufacturers to integrate several third-party Intellectual Property (IP) cores …
Automated detection of spectre and meltdown attacks using explainable machine learning
Spectre and Meltdown attacks exploit security vulnerabilities of advanced architectural
features to access inherently concealed memory data without authorization. Existing …
features to access inherently concealed memory data without authorization. Existing …
Robust and secure quality monitoring for welding through platform-as-a-service: A resistance and submerged arc welding study
P Stavropoulos, A Papacharalampopoulos… - Machines, 2023 - mdpi.com
For smart manufacturing systems, quality monitoring of welding has already started to shift
from empirical modeling to knowledge integration directly from the captured data by utilizing …
from empirical modeling to knowledge integration directly from the captured data by utilizing …