Title
Guest Editorial Securing IoT Hardware: Threat Models and Reliable, Low-Power Design Solutions.
Abstract
It is well understood that for Internet of Things (IoT), security of underlying hardware is the key to safe and reliable operation. IoT service stack relies on security of network, software, and firmware, all of which, in turn, depend on functionality provided by the underlying hardware. The hardware may be compromised or attacked by multiple threat actors. The designer may create a backdoor that ...
Year
DOI
Venue
2017
10.1109/TVLSI.2017.2762398
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Keywords
Field
DocType
Special issues and sections,Internet of Things,Hardware,Trojan horses,Watermarking,Security
Hardware Trojan,Hardware security module,Computer science,Computer security,Threat model,Backdoor,Obfuscation,Abstraction layer,Malware,Computer hardware,Firmware
Journal
Volume
Issue
ISSN
25
12
1063-8210
Citations 
PageRank 
References 
2
0.37
0
Authors
2
Name
Order
Citations
PageRank
Anirban Sengupta118036.28
Sandip Kundu21103137.18