WeChat Mini Program
Old Version Features

Journal of Hardware and Systems Security Journal

Papers
Brent Sherman, Mike Borza, Brian Rosenberg, Charles Qi
System OEMs are increasingly adopting the motto “Trust but verify” when it comes to their supply chains. After several public incidents in which trusted vendors unknowingly provided vulnerable components, OEMs are requesting evidence of security assurance before integrating compo...
Cited3Views0
3
0
Download
BibtexChatPaperRate
There have been amazing developments in the security applications of sensors for Internet of Things (IoT), which lead to the increasing demand for the System-on-a-Chip (SoC) based on Trusted Platform Module (TPM). Low-power design has become the key to enhancing the competitivene...
Cited1Views0
1
0
Download
BibtexChatPaperRate
Adam Kimura,Jon Scholl,James Schaffranek, Matthew Sutter, Andrew Elliott, Mike Strizich,Glen David Via
This paper reviews a developed integrated circuit (IC) decomposition workflow that can be leveraged for extracting design files and performing advanced verification and validation techniques on fabricated chips. In this work, a commercial 130-nm microcontroller is delayered and i...
Cited19Views0
19
0
Download
BibtexChatPaperRate
Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest `link' in the security `chain'. In this paper, we present a survey of techniques for...
Cited22Views0
22
0
Download
BibtexChatPaperRate
We propose a novel malware detection system for critical embedded and cyber-physical systems (CPS). The system exploits electromagnetic (EM) side-channel signals from the device to detect malicious activity. During training, the system models EM emanations from an uncompromised d...
Cited59Views0
59
0
Download
BibtexChatPaperRate
Smart grids include a variety of microprocessor-based embedded systems, interconnected with communication technologies. In this interaction, hardware is the lower level of abstraction. Insecure and unprotected hardware design of smart grid devices enable system operation compromi...
Cited28Views0
28
0
Download
BibtexChatPaperRate
The global electronic supply chain industry is a complex and interconnected network of companies, organizations, and individuals that collaborate to produce and distribute electronic devices and components. It plays a critical role in the global economy, as electronic devices hav...
Cited0Views0
0
0
Download
BibtexChatPaperRate
In today’s globalized integrated circuit (IC) ecosystem, untrusted foundries are often procured to build critical systems since they offer state-of-the-art silicon with the best performance available. On the other hand, ICs that originate from trusted fabrication cannot match the...
Cited7Views0
7
0
Download
BibtexChatPaperRate
Recent years have seen rapid development and deployment of Internet-of-Things (IoT) applications in a diversity of application domains. This has resulted in creation of new applications (e.g., vehicle networking, smart grid, and wearables) as well as advancement, consolidation, a...
Cited148Views0
148
0
Download
BibtexChatPaperRate
In most scenarios, distributed denial of service (DDoS) attacks can be categorized into three distinct groups: (1) attacks targeting and consuming bandwidth, (2) attacks targeting selected applications and (3) attacks targeting connection-layer exhaustion. This study discusses in...
Cited55Views0
55
0
BibtexChatPaperRate
CLOC and SILC are two block cipher-based authenticated encryption schemes, submitted to the CAESAR competition, that aims to use low area buffer and handle short input efficiently. The designers of CLOC and SILC claimed \(\frac {n}{2}\)-bit integrity security against nonce-reusin...
Cited3Views0
3
0
Download
BibtexChatPaperRate
The traffic signal control (TSC) system is faced with both opportunities and challenges as a consequence of connected vehicle (CV) technology. Although implementing CV technology might considerably enhance safety and mobility performance, the connection between vehicles and trans...
Cited1Views0
1
0
BibtexChatPaperRate
Neuromorphic computing marks the beginning of a new era in computing system design, owing to the introduction of complex and unorthodox non-Von Neumann architectures, in conjunction with new post-CMOS nano-ionic devices. These neuromorphic chips are projected to soon become a mai...
Cited4Views0
4
0
Download
BibtexChatPaperRate
This work presents a versatile and flexible generator of various large integer polynomial multipliers to be used in hardware cryptocores. Flexibility is offered by allowing circuit designers to choose an appropriate multiplication method from a list that includes Schoolbook, Boot...
Cited7Views0
7
0
BibtexChatPaperRate
Access control is already an integral part of the Internet of Things (IoT) to prevent unauthorized use of systems. However, in the post-pandemic world, contactless authentication is desired for multi-user in-person systems. Biometric key-based hardware obfuscation can enable user...
Cited0Views0
0
0
BibtexChatPaperRate
Modern data centers employ complex and specialized power management architectures in the pursuit of energy and thermal efficiency. Interestingly, this rising complexity has exposed a new attack surface in an already vulnerable environment. In this work, we uncover a potent threat...
Cited6Views0
6
0
Download
BibtexChatPaperRate
Hardware Trojan (HT), intellectual property (IP) piracy, and overproduction of integrated circuit (IC) are three threats that may happen in untrusted fabrication foundries. HTs are malicious circuitry changes in the IC layout. They affect side-channels (IC parameters) such as pat...
Cited11Views0
11
0
Download
BibtexChatPaperRate