2019 IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS) 2019
DOI: 10.1109/mwscas.2019.8885183
|View full text |Cite
|
Sign up to set email alerts
|

(HIADIoT): Hardware Intrinsic Attack Detection in Internet of Things; Leveraging Power Profiling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…In some of our previously reported results [45] and [35], we were able to detect the IoT-ED attacker, provided that the attacks were predetermined. In this work, the attacks have been taken to another level.…”
Section: B Resultsmentioning
confidence: 87%
See 3 more Smart Citations
“…In some of our previously reported results [45] and [35], we were able to detect the IoT-ED attacker, provided that the attacks were predetermined. In this work, the attacks have been taken to another level.…”
Section: B Resultsmentioning
confidence: 87%
“…the start, duration, and end of the attacks on the HAN network are randomized. This randomness decreases the detection accuracy from 95.5% in [35] to be 67.73% using the PP data-set only. We come up with the message counting (NT data-set) to detect the hardware attacks and preserve privacy.…”
Section: B Resultsmentioning
confidence: 98%
See 2 more Smart Citations
“…The dynamic detection method applies specific stimulus to the circuit under test and observes the response from simulator or actual circuit, so as to effectively detect HTs in the circuit. Sidechannel signals analysis is a typical dynamic HTs detection method and have been widely researched in [3][4][5][6][7][8][9][10]. Ref.…”
Section: Introductionmentioning
confidence: 99%