RF Fingerprinting: Hardware-Trustworthiness Enhancement in the Hardware Trojan Era: RF Fingerprinting-Based Countermeasures
Published 2023 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
RF Fingerprinting: Hardware-Trustworthiness Enhancement in the Hardware Trojan Era: RF Fingerprinting-Based Countermeasures
Authors
Keywords
-
Journal
IEEE MICROWAVE MAGAZINE
Volume 24, Issue 11, Pages 35-52
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Online
2023-10-10
DOI
10.1109/mmm.2023.3303591
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Anti-Piracy Design of RF Transceivers
- (2022) Alan Rodrigo Diaz-Rizo et al. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS
- A Non-Destructive Method for Hardware Trojan Detection Based on Radio Frequency Fingerprinting
- (2022) Siya Mi et al. Electronics
- Leaking Wireless ICs via Hardware Trojan-Infected Synchronization
- (2022) Alán Rodrigo Díaz-Rizo et al. IEEE Transactions on Dependable and Secure Computing
- On-Chip Thermal Profiling to Detect Malicious Activity: System-Level Concepts and Design of Key Building Blocks
- (2021) Mengting Yan et al. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS
- SAT-Based Integrated Hardware Trojan Detection and Localization Approach Through Path-Delay Analysis
- (2021) Mohammad Sabri et al. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS
- Proof-Carrying Hardware-Based Information Flow Tracking in Analog/Mixed-Signal Designs
- (2021) Mohammad Mahdi Bidmeshki et al. IEEE Journal on Emerging and Selected Topics in Circuits and Systems
- EM Side Channels in Hardware Security: Attacks and Defenses
- (2021) Jiaji He et al. IEEE Design & Test
- Adaptive Trust Management for Soft Authentication and Progressive Authorization Relying on Physical Layer Attributes
- (2020) He Fang et al. IEEE TRANSACTIONS ON COMMUNICATIONS
- Fuzzy Learning for Multi-Dimensional Adaptive Physical Layer Authentication: A Compact and Robust Approach
- (2020) He Fang et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- Near-Field Backscattering-Based Sensing for Hardware Trojan Detection
- (2020) Sinan Adibelli et al. IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION
- Combining Thermal Maps With Inception Neural Networks for Hardware Trojan Detection
- (2020) Yiming Wen et al. IEEE Embedded Systems Letters
- Creating a Backscattering Side Channel to Enable Detection of Dormant Hardware Trojans
- (2019) Luong N. Nguyen et al. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS
- Demonstrating and Mitigating the Risk of an FEC-Based Hardware Trojan in Wireless Networks
- (2019) Kiruba Sankaran Subraman et al. IEEE Transactions on Information Forensics and Security
- Time-Modulated Arrays for Physical Layer Secure Communications: Optimization-based Synthesis and Experimental Assessment
- (2018) J. Guo et al. IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION
- Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection
- (2018) Hong Zhao et al. IEEE Transactions on Dependable and Secure Computing
- Radiated Electromagnetic Emission for Integrated Circuit Authentication
- (2017) Mosabbah Mushir Ahmed et al. IEEE MICROWAVE AND WIRELESS COMPONENTS LETTERS
- Advancing the State-of-the-Art in Hardware Trojans Detection
- (2017) Syed Kamran Haider et al. IEEE Transactions on Dependable and Secure Computing
- Hardware Trojan Detection Through Chip-Free Electromagnetic Side-Channel Statistical Analysis
- (2017) Jiaji He et al. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS
- Silicon Demonstration of Hardware Trojan Design and Detection in Wireless Cryptographic ICs
- (2017) Yu Liu et al. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS
- Trusted Analog/Mixed- Signal/RF ICs: A Survey and a Perspective
- (2017) Angelos Antonopoulos et al. IEEE Design & Test
- Surviving Information Leakage Hardware Trojan Attacks Using Hardware Isolation
- (2017) Nianhang Hu et al. IEEE Transactions on Emerging Topics in Computing
- On Reverse Engineering-Based Hardware Trojan Detection
- (2016) Chongxi Bao et al. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS
- A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends
- (2016) Yulong Zou et al. PROCEEDINGS OF THE IEEE
- Wireless communications in the era of big data
- (2015) Suzhi Bi et al. IEEE COMMUNICATIONS MAGAZINE
- Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans
- (2015) Chongxi Bao et al. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS
- A High-Sensitivity Electric Probe Based on Board-Level Edge Plating and LC Resonance
- (2014) Eakhwan Song et al. IEEE MICROWAVE AND WIRELESS COMPONENTS LETTERS
- A Resonant E-Field Probe for RFI Measurements
- (2014) Guanghua Li et al. IEEE TRANSACTIONS ON ELECTROMAGNETIC COMPATIBILITY
- A Primer on Hardware Security: Models, Methods, and Metrics
- (2014) Masoud Rostami et al. PROCEEDINGS OF THE IEEE
- Hardware Trojan Attacks: Threat Analysis and Countermeasures
- (2014) Swarup Bhunia et al. PROCEEDINGS OF THE IEEE
- Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis
- (2012) Seetharam Narasimhan et al. IEEE TRANSACTIONS ON COMPUTERS
- A Survey of Hardware Trojan Taxonomy and Detection
- (2010) Mohammad Tehranipoor et al. IEEE DESIGN & TEST OF COMPUTERS
- Parameter Variation Tolerance and Error Resiliency: New Design Paradigm for the Nanoscale Era
- (2010) Swaroop Ghosh et al. PROCEEDINGS OF THE IEEE
- Wireless data traffic: a decade of change
- (2009) Emir Halepovic et al. IEEE NETWORK
- Electromagnetic Measurements for Counterfeit Detection of Radio Frequency Identification Cards
- (2009) H.P. Romero et al. IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES
- A Sensitivity Analysis of Power Signal Methods for Detecting Hardware Trojans Under Real Process and Environmental Conditions
- (2009) Reza Rad et al. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS
- Using the physical layer for wireless authentication in time-variant channels
- (2008) Liang Xiao et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started