Title | ||
---|---|---|
Guest Editorial Securing IoT Hardware: Threat Models and Reliable, Low-Power Design Solutions. |
Abstract | ||
---|---|---|
It is well understood that for Internet of Things (IoT), security of underlying hardware is the key to safe and reliable operation. IoT service stack relies on security of network, software, and firmware, all of which, in turn, depend on functionality provided by the underlying hardware. The hardware may be compromised or attacked by multiple threat actors. The designer may create a backdoor that ... |
Year | DOI | Venue |
---|---|---|
2017 | 10.1109/TVLSI.2017.2762398 | IEEE Transactions on Very Large Scale Integration (VLSI) Systems |
Keywords | Field | DocType |
Special issues and sections,Internet of Things,Hardware,Trojan horses,Watermarking,Security | Hardware Trojan,Hardware security module,Computer science,Computer security,Threat model,Backdoor,Obfuscation,Abstraction layer,Malware,Computer hardware,Firmware | Journal |
Volume | Issue | ISSN |
25 | 12 | 1063-8210 |
Citations | PageRank | References |
2 | 0.37 | 0 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Anirban Sengupta | 1 | 180 | 36.28 |
Sandip Kundu | 2 | 1103 | 137.18 |