A survey on hardware security: Current trends and challenges

S Akter, K Khalil, M Bayoumi - IEEE Access, 2023 - ieeexplore.ieee.org
Hardware security has become a critical concern due to the globalization of the Integrated
Circuit (IC) supply chain and the complex network connections of computing-intensive …

A comprehensive survey on hardware-assisted malware analysis and primitive techniques

EP Kumar, S Priyanka - Computer Networks, 2023 - Elsevier
Malware poses an extremely dangerous threat to the digital world, significantly impacting
various domains such as smart cities, intelligent transportation, wireless sensor networks …

Toward a hardware man-in-the-middle attack on pcie bus

MA Khelif, J Lorandel, O Romain, M Regnery… - Microprocessors and …, 2020 - Elsevier
The growing need for high rate communication of recent embedded systems is leading to
the adoption of the PCIe protocol (Peripheral Component Interconnect express) as an …

A low-cost hardware attack detection solution for IoT devices

J Lorandel, MA Khelif, O Romain - 2022 IEEE 31st International …, 2022 - ieeexplore.ieee.org
Hardware security becomes a major concern for the development of future IoT devices. In
this paper, we propose to investigate traffic monitoring for a low-cost real-time anomaly …

Exploring Classic Security Attacks and Hardware Intricacies

K Khalil, H Idriss, T Idriss, M Bayoumi - Lightweight Hardware Security and …, 2025 - Springer
This chapter explores classic security attacks on hardware systems, focusing on
vulnerabilities stemming from common practices in hardware design and manufacturing. It …

A comprehensive survey on hardware-assisted malware analysis and primitive techniques

E Praveen Kumar, S Priyanka - 2023 - dl.acm.org
Malware poses an extremely dangerous threat to the digital world, significantly impacting
various domains such as smart cities, intelligent transportation, wireless sensor networks …

[PDF][PDF] Hardware man-in-the-middle attacks on smartphones

MA Khelif, J Lorandel… - Forensic Science …, 2020 - pdfs.semanticscholar.org
With the democratization of smartphones, law enforcement agencies are increasingly faced
with the necessity of extracting data from criminal devices. Several vulnerabilities can be …

Lightweight Hardware Security and Physically Unclonable Functions

K Khalil, H Idriss, T Idriss, M Bayoumi - Springer
The rapid growth of the Internet of Things (IoT) and the increasing deployment of resource-
constrained devices in critical applications such as healthcare, supply chain management …

Work-in-Progress: Development of a Stress Based End-to-End Flow Silicon Validation Framework for an Advanced Ethernet Controller

J ROOPA, S BHAT, R RENJITH - 2021 6th International …, 2021 - ieeexplore.ieee.org
There is a constant demand for semiconductor chips which are getting miniaturized due to
advances in VLSI design. This helps in modularizing ethernet controller-based System on …

Experimental interfacing with the IPhone 6s through its PCIe communication bus

MA Khelif, J Lorandel, O Romain - 2022 IEEE 31st International …, 2022 - ieeexplore.ieee.org
One of the issues to perform hardware attacks on wired communication protocol is the
physical access to the bus. Considering the iPhones, PCIe is used as a communication bus …