Akter et al., 2023 - Google Patents
Hardware security in the internet of things: A surveyAkter et al., 2023
- Document ID
- 6882333541029599037
- Author
- Akter S
- Khalil K
- Bayoumi M
- Publication year
- Publication venue
- 2023 IEEE 36th International System-on-Chip Conference (SOCC)
External Links
Snippet
Over the past decades, researchers have paid a lot of attention to hardware security, especially in the Internet of Things (IoT) field. As a result, lots of security approaches have been proposed in the literature to safeguard IoT devices. However, there is still much …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xue et al. | Ten years of hardware Trojans: a survey from the attacker's perspective | |
Rostami et al. | A primer on hardware security: Models, methods, and metrics | |
Subramanyan et al. | Evaluating the security of logic encryption algorithms | |
Jain et al. | Survey of recent developments for hardware trojan detection | |
Jacob et al. | Hardware Trojans: current challenges and approaches | |
Francq et al. | Introduction to hardware Trojan detection methods | |
Akter et al. | A survey on hardware security: Current trends and challenges | |
Tehranipoor et al. | A survey of hardware trojan taxonomy and detection | |
Akter et al. | Hardware security in the internet of things: A survey | |
Karunakaran et al. | Malicious combinational hardware trojan detection by gate level characterization in 90nm technology | |
Vosatka | Introduction to hardware trojans | |
Hassan et al. | Circuit topology-aware vaccination-based hardware trojan detection | |
Dey et al. | Secure physical design | |
Mankali et al. | Titan: Security analysis of large-scale hardware obfuscation using graph neural networks | |
Kareem et al. | Physical unclonable functions based hardware obfuscation techniques: A state of the art | |
Farahmandi et al. | CAD for hardware security | |
Dou et al. | Design and analysis of hardware Trojans in approximate circuits | |
Naveenkumar et al. | Hardware Trojans Detection and Prevention Techniques Review | |
Li et al. | Signal word‐level statistical properties‐based activation approach for hardware Trojan detection in DSP circuits | |
Danesh et al. | Efficient hardware Trojan detection with differential cascade voltage switch logic | |
Naveenkumar et al. | Design of INV/BUFF logic locking for enhancing the hardware security | |
Mohankumar et al. | Lightweight Logic Obfuscation in Combinational Circuits for Improved Security—An Analysis | |
Santikellur et al. | Introduction to machine learning for hardware security | |
Rajmohan et al. | Hybrid evolutionary design space exploration algorithm with defence against third party IP vulnerabilities | |
Rajendran et al. | Sensitivity analysis of testability parameters for secure IC design |