2021
DOI: 10.3390/s21103408
|View full text |Cite
|
Sign up to set email alerts
|

Malicious Activity Detection in Lightweight Wearable and IoT Devices Using Signal Stitching

Abstract: The integrated circuit (IC) manufacturing process involves many players, from chip/board design and fabrication to firmware design and installation. In today’s global supply chain, any of these steps are prone to interference from rogue players, creating a security risk. Therefore, manufactured devices need to be verified to perform only their intended operations since it is not economically feasible to control the supply chain and use only trusted facilities. This paper presents a detection technique for mali… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 45 publications
0
2
0
Order By: Relevance
“…The side-channel-dependent approach proposed by Karabacak et al. [ 43 ] was also based on self-referencing, and did not rely on plausible samples. Zhu et al.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The side-channel-dependent approach proposed by Karabacak et al. [ 43 ] was also based on self-referencing, and did not rely on plausible samples. Zhu et al.…”
Section: Related Workmentioning
confidence: 99%
“…With a fully automated detection framework, it can reliably detect minor hardware Trojans. The side-channel-dependent approach proposed by Karabacak et al [43] was also based on self-referencing, and did not rely on plausible samples. Zhu et al [44] proposed a Jintide architecture to verify the chip at runtime using a trusted external monitor.…”
Section: Nondestructive Detectionmentioning
confidence: 99%