Designing an internet of things laboratory to improve student understanding of secure IoT systems

AR Rao, A Elias-Medina - Internet of Things and Cyber-Physical Systems, 2024 - Elsevier
In response to an alarming shortage of workers in cybersecurity and a growing skills gap,
the US Department of Defense is taking steps to build cybersecurity capacity through …

Security patterns for automotive systems

BHC Cheng, B Doherty, N Polanco… - 2019 ACM/IEEE 22nd …, 2019 - ieeexplore.ieee.org
As automotive systems become increasingly sophisticated with numerous onboard features
that support extensive inward and outward facing communication, cybersecurity …

A literature review on security-aware design space exploration approaches for embedded systems

F Boutekkouk - International Journal of Security and …, 2022 - inderscienceonline.com
Design space exploration (DSE) is a key activity in any embedded system design flow
during which, decisions on architectural choices are made and their impacts on the overall …

Quantum steganography based on the B92 quantum protocol

AG Tudorache, V Manta, S Caraiman - Mathematics, 2022 - mdpi.com
This paper presents a communication algorithm in which a grayscale image, shared
between two parties, can be used to transmit a secret message, by applying the idea …

[PDF][PDF] Security patterns for connected and automated automotive systems

BHC Cheng, B Doherty, N Polanco… - Journal of Automotive …, 2020 - athena-publishing.com
As automotive systems become increasingly sophisticated with numerous onboard features
that support extensive inward and outward-facing communication, cybersecurity …

Enabling a Multi-Pronged Socio-technical Approach to Address Automotive Cybersecurity

N Polanco - 2025 - search.proquest.com
The increase of inward-facing and outward-facing communication used by modern vehicles
with automated features expands the breadth and depth of automotive cybersecurity …

Applying Zero Trust Principles to Distributed Embedded Engine Control Systems

M Pakmehr, T Khamvilai, AR Behbahani… - AIAA AVIATION 2022 …, 2022 - arc.aiaa.org
View Video Presentation: https://doi. org/10.2514/6.2022-3480. vid The integration of
information and communication technology tools into mechanical and aerospace devices …

Minimizing side-channel attack vulnerability via schedule randomization

N Vreman, R Pates, K Krüger, G Fohler… - 2019 IEEE 58th …, 2019 - ieeexplore.ieee.org
Control systems can be vulnerable to security threats where an attacker gathers information
about the execution of the system. In particular, side-channel attacks exploit the predictability …

Safe and secure model-driven design for embedded systems

L Li - 2018 - pastel.hal.science
The presence of communicating embedded systems/IoTs in our daily lives have brought a
myriad of benefits, from adding conveniences and entertainment, to improving the safety of …

An embedded key management system for PUF-based security enclosures

J Obermaier, F Hauschild, M Hiller… - 2018 7th Mediterranean …, 2018 - ieeexplore.ieee.org
Hardware Security Modules (HSMs) are embedded systems which provide a physically
secured environment for data storage and handling. The device is protected by an enclosure …