2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC) 2016
DOI: 10.1109/aspdac.2016.7427991
|View full text |Cite
|
Sign up to set email alerts
|

A mutual auditing framework to protect IoT against hardware Trojans

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(14 citation statements)
references
References 22 publications
0
14
0
Order By: Relevance
“…A combination of attacks, denial-of-service attack and covert channel attack, have been addressed in [8] and [9]. In [8], Dofe et al introduce a dynamic permutation method to address both hardware Trojan and side-channel analysis attacks.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…A combination of attacks, denial-of-service attack and covert channel attack, have been addressed in [8] and [9]. In [8], Dofe et al introduce a dynamic permutation method to address both hardware Trojan and side-channel analysis attacks.…”
Section: Related Workmentioning
confidence: 99%
“…They do not need network-level protection or run-time detection. Liu et al in [9] introduced a framework to monitor data communications in the IoT-EDs. They utilize different vendors for IoT-EDs to build a distributed framework where each IoT-ED monitors the trustworthiness of their neighbors.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Some of these interruptions have been investigated, such as trojans in IoT [22] and various viruses (Stuxnet [23]). …”
Section: Service Interruptionmentioning
confidence: 99%