On hardware-trojan-assisted power budgeting system attack targeting many core systems

Y Zhao, X Wang, Y Jiang, L Wang, M Yang… - Journal of Systems …, 2020 - Elsevier
In a modern many-core chip, as all the cores are constantly competing for their shares of
power out of the maximum power available to the chip, a sound power budgeting scheme is …

A Novel Fast Recovery Method for HT Tamper in Embedded Processor

W Zhou, S Yuan, L Li, KH Yeh - International Conference on Blockchain …, 2022 - Springer
Nowadays, embedded processors face various hardware security issues such as hardware
trojans (HT) and code tamper attacks. In this paper, a novel cycle-level recovery method for …

Design for Assurance: Employing Functional Verification Tools for Thwarting Hardware Trojan Threat in 3PIPs

W Hu, B Li, L Wu, Y Li, X Li, L Hong - arXiv preprint arXiv:2311.12321, 2023 - arxiv.org
Third-party intellectual property cores are essential building blocks of modern system-on-
chip and integrated circuit designs. However, these design components usually come from …

A cycle-level recovery method for embedded processor against HT tamper

W Zhou, KH Yeh, S Yuan, L Li - Heliyon, 2023 - cell.com
As the core of Internet of Things (IoT), embedded processors are being used more and more
extensive. However, embedded processors face various hardware security issues such as …

Hardware Security in the Context of Internet of Things: Challenges and Opportunities

P Santikellur, RS Chakraborty… - Internet of Things and …, 2020 - taylorfrancis.com
This chapter explores the unique challenges of secure Internet of Things (IoT)
implementations, especially from the perspective of hardware security, and their solutions …