A survey on hardware security: Current trends and challenges

S Akter, K Khalil, M Bayoumi - IEEE Access, 2023 - ieeexplore.ieee.org
Hardware security has become a critical concern due to the globalization of the Integrated
Circuit (IC) supply chain and the complex network connections of computing-intensive …

Rt-tee: Real-time system availability for cyber-physical systems using arm trustzone

J Wang, A Li, H Li, C Lu, N Zhang - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Embedded devices are becoming increasingly pervasive in safety-critical systems of the
emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM …

Aion: Enabling open systems through strong availability guarantees for enclaves

F Alder, J Van Bulck, F Piessens… - Proceedings of the 2021 …, 2021 - dl.acm.org
Embedded Trusted Execution Environments (TEEs) can provide strong security for software
in the IoT or in critical control systems. Approaches to combine this security with real-time …

Speccfa: Enhancing control flow attestation/auditing via application-aware sub-path speculation

A Caulfield, L Tyler, IDO Nunes - arXiv preprint arXiv:2409.18403, 2024 - arxiv.org
At the edge of modern cyber-physical systems, Micro-Controller Units (MCUs) are
responsible for safety-critical sensing/actuation. However, MCU cost constraints rule out the …

[HTML][HTML] Control-flow attestation: Concepts, solutions, and open challenges

Z Sha, C Shepherd, A Rafi, K Markantonakis - Computers & Security, 2025 - Elsevier
Control-flow attestation unifies the worlds of control-flow integrity and platform attestation by
measuring and reporting a target's run-time behaviour to a verifier. Trust assurances in the …

Veda-PUF: a PUF based on vedic principles for robust lightweight security for IoT

VP Yanambaka, SP Mohanty… - … on Smart Electronic …, 2021 - ieeexplore.ieee.org
This paper proposes a new controlled Physical Unclonable Function (PUF), Veda-PUF,
which uses an algorithm for pre-processing and post-processing the input and output of PUF …

Hardware Vulnerabilities: Taxonomy and Business Security Models

NZ Jhanjhi, IA Shah, SN Brohi - Generative AI for Web Engineering …, 2025 - igi-global.com
The primary objective of this chapter is to address the hardware vulnerabilities risks and
challenges. A hardware vulnerability is a flaw in a computer system that can be remotely …