[HTML][HTML] Adversarial attacks and defenses on ML-and hardware-based IoT device fingerprinting and identification

PMS Sánchez, AH Celdrán, G Bovet… - Future Generation …, 2024 - Elsevier
In the last years, the number of IoT devices deployed has suffered an undoubted explosion,
reaching the scale of billions. However, some new cybersecurity issues have appeared …

Comprehensive Taxonomy and Advancements in IoT Device Authentication Schemes

S El Jaouhari - 2023 International Conference on Smart-Green …, 2023 - ieeexplore.ieee.org
The rapid proliferation of Internet of Things (IoT) devices has underscored the critical
importance of robust authentication frameworks to ensure the security and integrity of these …

[PDF][PDF] 2 Intellectual Merit and Impact

P Sristi - patanjali.github.io
Design (ICCAD), respectively. We have extended the observations in Karna to develop a
tool called SOLOMON that can identify locations in the design susceptible to Fault Attacks [5] …