0
1

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?

Mitigation of Automotive Control Modules Hardware Replacement-based Attacks Through Hardware Signature,

Posted at

Mitigation of Automotive Control Modules Hardware Replacement-based Attacks Through Hardware Signature, Publisher: IEEE
Franco Oberti; Ernesto Sanchez; Alessandro Savino; Filippo Parisi; Stefano Di Carlo
https://ieeexplore.ieee.org/document/9525579

Reference

  1. R. R.V. and K. A. Secure boot of embedded applications - a review. In 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), pages 291–298, 2018.
  2. C. Lin and A. Sangiovanni-Vincentelli. Cyber-security for the controller area network (can) communication protocol. In 2012 International Conference on Cyber Security, pages 1–7, 2012.
  3. H. Kang, Y. Hori, and A. Satoh. Performance evaluation of the first commercial puf-embedded rfid. In The 1st IEEE Global Conference on Consumer Electronics 2012, pages 5–8, 2012.
  4. R. Soga and H. Kang. Physical unclonable function using carbon resistor. In 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE), pages 559–561, 2020.
  5. M. Yasin, J. J. Rajendran, O. Sinanoglu, and R. Karri. On improving the security of logic locking. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 35 ( 9 ): 1411–1424, 2016.
  6. K. Juretus and I. Savidis. Increased output corruption and structural attack resilience for sat attack secure logic locking. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 40 ( 1 ): 38–51, 2021.
  7. T. Thangam, G. Gayathri, and T. Madhubala. A novel logic locking technique for hardware security. In 2017 IEEE International Conference on Electrical, Instrumentation and Communication Engineering (ICEICE), pages 1–7, 2017.
  8. F. Stellari, P. Song, A. J. Weger, J. Culp, A. Herbert, and D. Pfeiffer. Verification of untrusted chips using trusted layout and emission measurements. In 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pages 19–24, 2014.
  9. M. Majzoobi and F. Koushanfar. Time-bounded authentication of fpgas. IEEE Transactions on Information Forensics and Security, 6 ( 3 ): 1123–1135, 2011.
  10. M. B. Bahador, M. Abadi, and A. Tajoddin. Hpcmalhunter: Behavioral malware detection using hardware performance counters and singular value decomposition. In 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE), pages 703–708, 2014.

Related Article on Qiita

CAN FD and CAN XL on arXiv
https://qiita.com/kaizen_nagoya/items/d8efb0da53cd3456f735

CAN FD & CAN XL on arXiv references
https://qiita.com/kaizen_nagoya/items/7df86c66084372a96f1d

CAN FD & CAN XL on arXiv references name order
https://qiita.com/kaizen_nagoya/items/ec5e4e4491228db534c0

CAN FD & CAN XL on arXiv references name order and related link
https://qiita.com/kaizen_nagoya/items/e6c75c799db62d078bd0

Comparison of Classical CAN, CAN FD, and CAN XL and CAN XL
https://qiita.com/kaizen_nagoya/items/773835b2bf3cddd17dd8

Comparison of CAN XL & 10BASE-T1S Functionality on Layer 1 and Layer 2
https://qiita.com/kaizen_nagoya/items/13235743ba8d7193a53b

0
1
0

Register as a new user and use Qiita more conveniently

  1. You get articles that match your needs
  2. You can efficiently read back useful information
  3. You can use dark theme
What you can do with signing up
0
1

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?