Safety and security in cyber-physical systems and internet-of-things systems

M Wolf, D Serpanos - Proceedings of the IEEE, 2017 - ieeexplore.ieee.org
Safety and security have traditionally been distinct problems in engineering and computer
science. The introduction of computing elements to create cyber-physical systems (CPSs) …

Combinatorial testing: Theory and practice

DR Kuhn, R Bryce, F Duan, LS Ghandehari, Y Lei… - Advances in …, 2015 - Elsevier
Combinatorial testing has rapidly gained favor among software testers in the past decade as
improved algorithms have become available and practical success has been demonstrated …

Protection against hardware trojans with logic testing: Proposed solutions and challenges ahead

S Dupuis, ML Flottes, G Di Natale… - IEEE Design & …, 2017 - ieeexplore.ieee.org
Protection against Hardware Trojans with Logic Testing: Proposed Solutions and
Challenges Ahead Page 1 2168-2356 (c) 2017 IEEE. Personal use is permitted, but …

Scalable activation of rare triggers in hardware trojans by repeated maximal clique sampling

Y Lyu, P Mishra - … Transactions on Computer-Aided Design of …, 2020 - ieeexplore.ieee.org
Hardware Trojans are serious threat to security and reliability of computing systems. It is
hard to detect these malicious implants using traditional validation methods since an …

Finding bugs in cryptographic hash function implementations

N Mouha, MS Raunak, DR Kuhn… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Cryptographic hash functions are security-critical algorithms with many practical
applications, notably in digital signatures. Developing an approach to test them can be …

An efficient design and implementation of the in-parameter-order algorithm

K Kleine, DE Simos - Mathematics in Computer Science, 2018 - Springer
Abstract The In-Parameter-Order-General algorithm is one of the most widely used
algorithms for covering array generation. It has found wide adoption in the field of …

[HTML][HTML] A survey on the state of the art of complexity problems for covering arrays

L Kampel, DE Simos - Theoretical Computer Science, 2019 - Elsevier
In this paper, a first systematic review and analysis of the current state of the art pertaining to
complexity problems for a heavily researched class of designs, namely covering arrays, is …

A variational technique for source localization based on a sparse signal reconstruction perspective

M Cetin, DM Malioutov… - 2002 IEEE International …, 2002 - ieeexplore.ieee.org
We propose a novel non-parametric technique for source localization with passive sensor
arrays. Our approach involves formulation of the problem in a variational framework where …

Locating hardware trojans using combinatorial testing for cryptographic circuits

L Kampel, P Kitsos, DE Simos - IEEE Access, 2022 - ieeexplore.ieee.org
This paper presents a novel method for locating combinational hardware Trojans (HT)
based on fault location approaches used in combinatorial testing. This method relies …

Hardware trust through layout filling: A hardware Trojan prevention technique

PS Ba, S Dupuis, M Palanichamy… - 2016 IEEE Computer …, 2016 - ieeexplore.ieee.org
The insertion of malicious alterations to a circuit, referred to as Hardware Trojans, is a threat
considered more and more seriously during the last years. Numerous methods have been …