[HTML][HTML] A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain

H Pourrahmani, A Yavarinasab, AMH Monazzah - Internet of Things, 2023 - Elsevier
The current advances in the Internet of Things (IoT) and the solutions being offered by this
technology have accounted IoT among the top ten technologies that will transform the global …

A review on HT attacks in PLD and ASIC designs with potential defence solutions

G Sumathi, L Srivani, D Thirugnana Murthy… - IETE Technical …, 2018 - Taylor & Francis
The tremendous advancement in very large scale integration technology encourages chip
designers to rely on commercial electronic design automation tools, offshore fabrication …

Predict insider threats using human behaviors

JU Mills, SMF Stuban, J Dever - IEEE Engineering …, 2017 - ieeexplore.ieee.org
In a Systems Engineering perspective, insider threats are not new but emerging. For modern
systems that require a seamless integration between human and machine, human …

Cist: A threat modelling approach for hardware supply chain security

B Halak - Hardware Supply Chain Security: Threat Modelling …, 2021 - Springer
The relentless drive for more sophisticated and cheaper electronics products has led to
unprecedented level of outsourcing in the hardware supply chain. This has led to the …

Trojan awakener: Detecting dormant malicious hardware using laser logic state imaging

T Krachenfels, JP Seifert, S Tajik - Proceedings of the 5th Workshop on …, 2021 - dl.acm.org
The threat of hardware Trojans (HTs) and their detection is a widely studied field. While the
effort for inserting a Trojan into an application-specific integrated circuit (ASIC) can be …

Hardware security in sensor and its networks

MMR Monjur, J Heacock, J Calzadillas… - Frontiers in …, 2022 - frontiersin.org
Sensor networks and IoT systems have been widely deployed in monitoring and controlling
system. With its increasing utilization, the functionality and performance of sensor networks …

Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)

T Krachenfels, JP Seifert, S Tajik - Journal of Cryptographic Engineering, 2023 - Springer
The threat of (HTs) and their detection is a widely studied field. While the effort for inserting a
Trojan into an (ASIC) can be considered relatively high, especially when trusting the chip …

Defeating silicon reverse engineering using a layout-level standard cell camouflage

H Gomez, C Duran, E Roa - IEEE Transactions on Consumer …, 2019 - ieeexplore.ieee.org
Intellectual property protection techniques face a challenging task in countering a physical
attack by reverse engineering the netlist of an embedded integrated circuit. An attacker can …

Modeling hardware trojans in 3D ICs

Z Zhang, Q Yu - … IEEE Computer Society Annual Symposium on …, 2019 - ieeexplore.ieee.org
Three-dimensional (3D) integration facilitates to integrate increasing number of transistors
into a single package. Despite of improved performance and power efficiency, the …

Using regression to predict potential insider threats

JU Mills, JR Dever, SMF Stuban - Defense AR Journal, 2018 - search.proquest.com
the Navy adopted the new strategies of Agile and Streamlined acquisition and OA-based
technology that utilizes open source software (p. 233). The new solution also avoids …