Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats

Z Chen, J Liu, Y Shen, M Simsek, B Kantarci… - ACM Computing …, 2022 - dl.acm.org
Despite its technological benefits, the Internet of Things (IoT) has cyber weaknesses due to
vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …

Harnessing disorder for photonic device applications

H Cao, Y Eliezer - Applied Physics Reviews, 2022 - pubs.aip.org
For photonic devices, structural disorder and light scattering have long been considered
annoying and detrimental features that were best avoided or minimized. This review shows …

B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection

V Immler, J Obermaier, M König… - … on hardware oriented …, 2018 - ieeexplore.ieee.org
Protecting embedded devices against physical attacks is a challenging task since the
attacker has control of the device in a hostile environment. To address this issue, current …

Impact of electric vehicles botnets on the power grid

OGM Khan, E El-Saadany, A Youssef… - 2019 IEEE Electrical …, 2019 - ieeexplore.ieee.org
The increased penetration of Electric Vehicles (EVs) in the transportation sector has
increased the requirement of Fast Charging Direct Current (FCDC) stations to meet …

A novel model for vulnerability analysis through enhanced directed graphs and quantitative metrics

Á Longueira-Romero, R Iglesias, JL Flores, I Garitano - Sensors, 2022 - mdpi.com
The rapid evolution of industrial components, the paradigm of Industry 4.0, and the new
connectivity features introduced by 5G technology all increase the likelihood of cybersecurity …

New insights to key derivation for tamper-evident physical unclonable functions

V Immler, K Uppund - IACR Transactions on Cryptographic Hardware …, 2019 - tches.iacr.org
Several publications presented tamper-evident Physical Unclonable Functions (PUFs) for
secure storage of cryptographic keys and tamper-detection. Unfortunately, previously …

A measurement system for capacitive PUF-based security enclosures

J Obermaier, V Immler, M Hiller, G Sigl - Proceedings of the 55th Annual …, 2018 - dl.acm.org
Battery-backed security enclosures that are permanently monitored for penetration and
tampering are common solutions for providing physical integrity to multi-chip embedded …

1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits

DM Mehta, M Hashemi, D Forte, S Tajik… - IACR Transactions on …, 2024 - tosc.iacr.org
A universal circuit (UC) can be thought of as a programmable circuit that can simulate any
circuit up to a certain size by specifying its secret configuration bits. UCs have been …

The past, present, and future of physical security enclosures: from battery-backed monitoring to puf-based inherent security and beyond

J Obermaier, V Immler - Journal of hardware and systems security, 2018 - Springer
Withstanding physical attacks in a hostile environment is of utmost importance for nowadays
electronics. However, due to the long and costly development of integrated circuits (ICs), IC …

Real-time congestion-aware charging station assignment model for evs

OGM Khan, F Elghitani, A Youssef… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The electrification of the transportation system is double-edged for the smart grid. Although it
is green and eco-friendly, uncontrolled charging of electric vehicles (EVs) could cause not …