An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Research trends, challenges, and emerging topics in digital forensics: A review of reviews

F Casino, TK Dasaklis, GP Spathoulas… - IEEE …, 2022 - ieeexplore.ieee.org
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …

Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications

G Kumar, R Saha, C Lal, M Conti - Future Generation Computer Systems, 2021 - Elsevier
Digital forensic in Internet-of-Thing (IoT) paradigm is critical due to its heterogeneity and lack
of transparency of evidence processing. Moreover, cross-border legalization makes a …

A secure and anonymous communicate scheme over the internet of things

Q Sun, K Lin, C Si, Y Xu, S Li, P Gope - ACM Transactions on Sensor …, 2022 - dl.acm.org
Anonymous exchange of data has a strong demand in many scenarios. With the
development of IoT and wireless networks, plenty of smart devices are interconnected …

[HTML][HTML] IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques

S Balogh, O Gallo, R Ploszek, P Špaček, P Zajac - Electronics, 2021 - mdpi.com
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT
devices are especially damaging and need to be addressed. In this treatise, we overview …

[HTML][HTML] Cyber-security threats and side-channel attacks for digital agriculture

AN Alahmadi, SU Rehman, HS Alhazmi, DG Glynn… - Sensors, 2022 - mdpi.com
The invention of smart low-power devices and ubiquitous Internet connectivity have
facilitated the shift of many labour-intensive jobs into the digital domain. The shortage of …

Cyber reconnaissance techniques

W Mazurczyk, L Caviglione - Communications of the ACM, 2021 - dl.acm.org
Cyber reconnaissance techniques Page 1 86 COMMUNICATIONS OF THE ACM | MARCH 2021
| VOL. 64 | NO. 3 review articles IMA GE B Y DE S TROL O VE ALMOST EVERY DAY, security …

Opening pandora's box: A systematic study of new ways microarchitecture can leak private data

JRS Vicarte, P Shome, N Nayak… - 2021 ACM/IEEE 48th …, 2021 - ieeexplore.ieee.org
Microarchitectural attacks have plunged Computer Architecture into a security crisis. Yet, as
the slowing of Moore's law justifies the use of ever more exotic microarchitecture, it is likely …

Survey and taxonomy of adversarial reconnaissance techniques

S Roy, N Sharmin, JC Acosta, C Kiekintveld… - ACM Computing …, 2022 - dl.acm.org
Adversaries are often able to penetrate networks and compromise systems by exploiting
vulnerabilities in people and systems. The key to the success of these attacks is information …

{In-Kernel}{Control-Flow} integrity on commodity {OSes} using {ARM} pointer authentication

S Yoo, J Park, S Kim, Y Kim, T Kim - 31st USENIX Security Symposium …, 2022 - usenix.org
This paper presents an in-kernel, hardware-based control-flow integrity (CFI) protection,
called PAL, that utilizes ARM's Pointer Authentication (PA). It provides three important …