Distributed Energy Resource Management System (DERMS) Cybersecurity Scenarios, Trends, and Potential Technologies: A Review

N Sugunaraj, SRA Balaji, BS Chandar… - … Surveys & Tutorials, 2025 - ieeexplore.ieee.org
Critical infrastructures like the power grid are at risk from increasing cyber threats due to
high penetration of interconnected distributed energy resources (DER). Compromised DER …

A cost-driven method for deep-learning-based hardware trojan detection

C Dong, Y Yao, Y Xu, X Liu, Y Wang, H Zhang, L Xu - Sensors, 2023 - mdpi.com
The Cyber-Physical System and even the Metaverse will become the second space in which
human beings live. While bringing convenience to human beings, it also brings many …

SiPGuard: run-time System-in-Package security monitoring via power noise variation

T Zhang, ML Rahman, HM Kamali… - … Transactions on Very …, 2023 - ieeexplore.ieee.org
As Moore's law comes to a crawl, advanced package and integration techniques become
increasingly crucial by allowing for the combination of fabricated silicon dies, so-called …

Robust hardware trojan detection method by unsupervised learning of electromagnetic signals

D Lee, J Lee, Y Jung, J Kauh… - IEEE Transactions on Very …, 2024 - ieeexplore.ieee.org
This article explores the threat posed by Hardware Trojans (HTs), malicious circuits
clandestinely embedded in hardware akin to software backdoors. Activation by attackers …

Delay based hardware Trojan detection exploiting spatial correlations to suppress variations

FN Esirci, AA Bayrakci - Integration, 2023 - Elsevier
Hardware Trojan detection is a crucial problem with many dimensions and high complexity.
Side channel analysis based methods are advantageous for not requiring Trojan activation …

An exquisitely sensitive variant-conscious post-silicon Hardware Trojan detection

FS Hossain, T Yuneda - Integration, 2023 - Elsevier
Hardware Trojans, malicious modifications or additions to circuit elements, are often
introduced during outsourced stages of IC manufacturing. Their presence in hardware …

[HTML][HTML] A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator

Z Liu, J Hou, J Wang, C Yang - Cryptography, 2024 - mdpi.com
With the boom in artificial intelligence (AI), numerous reconfigurable convolution neural
network (CNN) accelerators have emerged within both industry and academia, aiming to …

MUDDLE: Multi-Modal Dynamic Detector Loopback Evaluator to Expose Trojans in Zero-Trust PCB Systems

P Krishnamurthy, H Pearce, VR Surabhi, J Trujillo… - IEEE Micro, 2024 - ieeexplore.ieee.org
We propose the MUDDLE framework for hardware Trojan detection in Printed Circuit Boards
(PCBs) in a golden-free and zero-trust setting (unavailable known-good PCB …

Detecting Vulnerability in Hardware Description Languages: Opcode Language Processing

AG Ayar, A Sahruri, S Aygun… - IEEE Embedded …, 2023 - ieeexplore.ieee.org
Detecting vulnerable code blocks has become a highly popular topic in computer-aided
design, especially with the advancement of natural language processing (NLP). Analyzing …

Circuit Activity Fingerprinting Using Electromagnetic Side-Channel Sensing and Digital Circuit Simulations

AS Kacmarcik, P Juyal, M Prvulovic, A Zajić - IEEE Access, 2022 - ieeexplore.ieee.org
This paper introduces a novel circuit identification method based on “fingerprints” of periodic
circuit activity that does not rely on any circuit-specific reference measurements. We capture …