A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions

Ö Aslan, SS Aktuğ, M Ozkan-Okay, AA Yilmaz, E Akin - Electronics, 2023 - mdpi.com
Internet usage has grown exponentially, with individuals and companies performing multiple
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …

Advances in logic locking: Past, present, and prospects

HM Kamali, KZ Azar, F Farahmandi… - Cryptology ePrint …, 2022 - eprint.iacr.org
Logic locking is a design concealment mechanism for protecting the IPs integrated into
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …

Hardware trojans: Lessons learned after one decade of research

K Xiao, D Forte, Y Jin, R Karri, S Bhunia… - ACM Transactions on …, 2016 - dl.acm.org
Given the increasing complexity of modern electronics and the cost of fabrication, entities
from around the globe have become more heavily involved in all phases of the electronics …

Graphene and beyond: recent advances in two-dimensional materials synthesis, properties, and devices

Y Lei, T Zhang, YC Lin, T Granzier-Nakajima… - ACS Nanoscience …, 2022 - ACS Publications
Since the isolation of graphene in 2004, two-dimensional (2D) materials research has
rapidly evolved into an entire subdiscipline in the physical sciences with a wide range of …

[HTML][HTML] A survey of emerging threats in cybersecurity

J Jang-Jaccard, S Nepal - Journal of computer and system sciences, 2014 - Elsevier
The exponential growth of the Internet interconnections has led to a significant growth of
cyber attack incidents often with disastrous and grievous consequences. Malware is the …

A survey on physical unclonable function (PUF)-based security solutions for Internet of Things

A Shamsoshoara, A Korenda, F Afghah, S Zeadally - Computer Networks, 2020 - Elsevier
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …

Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain

U Guin, K Huang, D DiMase, JM Carulli… - Proceedings of the …, 2014 - ieeexplore.ieee.org
As the electronic component supply chain grows more complex due to globalization, with
parts coming from a diverse set of suppliers, counterfeit electronics have become a major …

Secure electronics enabled by atomically thin and photosensitive two-dimensional memtransistors

A Oberoi, A Dodda, H Liu, M Terrones, S Das - ACS nano, 2021 - ACS Publications
The rapid proliferation of security compromised hardware in today's integrated circuit (IC)
supply chain poses a global threat to the reliability of communication, computing, and control …

COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist

H Salmani - IEEE Transactions on Information Forensics and …, 2016 - ieeexplore.ieee.org
This paper presents a novel hardware Trojan detection technique in gate-level netlist based
on the controllability and observability analyses. Using an unsupervised clustering analysis …

Hardware-intrinsic security primitives enabled by analogue state and nonlinear conductance variations in integrated memristors

H Nili, GC Adam, B Hoskins, M Prezioso, J Kim… - Nature …, 2018 - nature.com
Hardware-intrinsic security primitives employ instance-specific and process-induced
variations in electronic hardware as a source of cryptographic data. Among various …