{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T23:26:00Z","timestamp":1770074760145,"version":"3.49.0"},"publisher-location":"Cham","reference-count":82,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032155757","type":"print"},{"value":"9783032155764","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-15576-4_24","type":"book-chapter","created":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T11:42:34Z","timestamp":1770032554000},"page":"372-392","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Toward Cybersecure-by-Design Manufacturing Systems: A Taxonomy of Hardware-Based Approaches for Software Cybersecurity Violation Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4223-8036","authenticated-orcid":false,"given":"Eda","family":"Marchetti","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8147-028X","authenticated-orcid":false,"given":"Anik\u00f3","family":"Costa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0839-9250","authenticated-orcid":false,"given":"Sanaz","family":"Nikghadam-Hojjati","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6348-1847","authenticated-orcid":false,"given":"Jos\u00e9","family":"Barata","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5502-303X","authenticated-orcid":false,"given":"Antonello","family":"Calabr\u00f2","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,3]]},"reference":[{"key":"24_CR1","doi-asserted-by":"publisher","first-page":"2941","DOI":"10.1080\/00207543.2018.1444806","volume":"56","author":"LD Xu","year":"2018","unstructured":"Xu, L.D., Xu, E.L., Li, L.: Industry 4.0: state of the art and future trends. Int. J. Prod. Res. 56, 2941\u20132962 (2018). https:\/\/doi.org\/10.1080\/00207543.2018.1444806","journal-title":"Int. J. Prod. Res."},{"key":"24_CR2","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1080\/00207543.2017.1351644","volume":"56","author":"A Kusiak","year":"2018","unstructured":"Kusiak, A.: Smart manufacturing. Int. J. Prod. Res. 56, 508\u2013517 (2018). https:\/\/doi.org\/10.1080\/00207543.2017.1351644","journal-title":"Int. J. Prod. Res."},{"key":"24_CR3","unstructured":"MarketsandMarkets: Cyber-Physical Systems Market Size, Share & Report, https:\/\/www.marketsandmarkets.com\/Market-Reports\/cyber-physical-systems-cps-market-150375126.html. last accessed 20 July 2025"},{"key":"24_CR4","doi-asserted-by":"publisher","DOI":"10.2777\/308407","volume-title":"Industry 50- Towards a Sustainable, Human-Centric and Resilient European Industry","author":"M Breque","year":"2021","unstructured":"Breque, M., De Nul, L., Petridis, A.: Industry 50- Towards a Sustainable, Human-Centric and Resilient European Industry. European Union, Brussels (2021). https:\/\/doi.org\/10.2777\/308407"},{"key":"24_CR5","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-030-28464-0_4","volume-title":"Collaborative Networks and Digital Transformation. PRO-VE 2019. IFIP Advances in Information and Communication Technology","author":"S Nikghadam-Hojjati","year":"2019","unstructured":"Nikghadam-Hojjati, S., Barata, J.: Computational creativity to design cyber-physical systems in industry 4.0. In: Camarinha-Matos, L.M. (ed.) Collaborative Networks and Digital Transformation. PRO-VE 2019. IFIP Advances in Information and Communication Technology, pp. 29\u201340. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-28464-0_4"},{"key":"24_CR6","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s11465-018-0499-5","volume":"13","author":"P Zheng","year":"2018","unstructured":"Zheng, P., Wang, H., Sang, Z., Zhong, R.Y., Liu, Y., Liu, C., Mubarok, K., Yu, S., Xu, X.: Smart manufacturing systems for industry 4.0: Conceptual framework, scenarios, and future perspectives. Front. Mech. Eng. 13, 137 (2018). https:\/\/doi.org\/10.1007\/s11465-018-0499-5","journal-title":"Front. Mech. Eng."},{"key":"24_CR7","doi-asserted-by":"publisher","unstructured":"Masum, R.: Cyber Security in Smart Manufacturing (Threats, Landscapes Challenges). 10180, (2023). https:\/\/doi.org\/10.48550\/arXiv.2304.10180","DOI":"10.48550\/arXiv.2304.10180"},{"key":"24_CR8","doi-asserted-by":"publisher","unstructured":"Sadeghi, A.R., Wachsmann, C., Waidner, M.: Security and privacy challenges in industrial Internet of Things. In: Proceedings - Design Automation Conference, pp. 1\u20136. Association for Computing Machinery, San Francisco, California (2015). https:\/\/doi.org\/10.1145\/2744769.2747942","DOI":"10.1145\/2744769.2747942"},{"key":"24_CR9","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2011.67","volume":"9","author":"R Langner","year":"2011","unstructured":"Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9, 49\u201351 (2011). https:\/\/doi.org\/10.1109\/MSP.2011.67","journal-title":"IEEE Secur. Priv."},{"key":"24_CR10","first-page":"2","volume":"1","author":"M Assante","year":"2015","unstructured":"Assante, M., Lee, R.: The industrial control system cyber kill chain. SANS Inst. InfoSec Read. Room 1, 2 (2015)","journal-title":"SANS Inst. InfoSec Read. Room"},{"key":"24_CR11","volume-title":"2021 ICS Cybersecurity- Year In Review","author":"Dragos","year":"2022","unstructured":"Dragos: 2021 ICS Cybersecurity- Year In Review. Hanover, Maryland, USA (2022)"},{"key":"24_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.003","author":"C Modi","year":"2013","unstructured":"Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in Cloud (2013). https:\/\/doi.org\/10.1016\/j.jnca.2012.05.003","journal-title":"A survey of intrusion detection techniques in Cloud"},{"key":"24_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109967","volume":"235","author":"E Praveen Kumar","year":"2023","unstructured":"Praveen Kumar, E., Priyanka, S.: A comprehensive survey on hardware-assisted malware analysis and primitive techniques. Comput. Netw. 235, 109967 (2023). https:\/\/doi.org\/10.1016\/j.comnet.2023.109967","journal-title":"Comput. Netw."},{"key":"24_CR14","doi-asserted-by":"publisher","first-page":"54115","DOI":"10.1109\/ACCESS.2024.3388716","volume":"12","author":"CP Chenet","year":"2024","unstructured":"Chenet, C.P., Savino, A., Di Carlo, S.: A survey on hardware-based malware detection approaches. IEEE Access. 12, 54115\u201354128 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3388716","journal-title":"IEEE Access."},{"key":"24_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3510410","volume":"54","author":"H Kayan","year":"2023","unstructured":"Kayan, H., Nunes, M., Rana, O., Burnap, P., Perera, C.: Cybersecurity of industrial cyber-physical systems: a review. ACM Comput. Surv. 54, 1\u201335 (2023). https:\/\/doi.org\/10.1145\/3510410","journal-title":"ACM Comput. Surv."},{"key":"24_CR16","unstructured":"Threat Intelligence: Proactive Cybersecurity - What Is It, and Why You Need It, https:\/\/www.threatintelligence.com\/blog\/proactive-cybersecurity?utm_source=chatgpt.com. last accessed 21 July 2025"},{"key":"24_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2015.09.009","volume":"56","author":"Y Cherdantseva","year":"2016","unstructured":"Cherdantseva, Y., et al.: A review of cyber security risk assessment methods for SCADA systems. Comput. Secur. 56, 1\u201327 (2016). https:\/\/doi.org\/10.1016\/j.cose.2015.09.009","journal-title":"Comput. Secur."},{"key":"24_CR18","doi-asserted-by":"publisher","first-page":"1851","DOI":"10.1109\/COMST.2019.2891891","volume":"21","author":"A Alshamrani","year":"2019","unstructured":"Alshamrani, A., Myneni, S., Chowdhary, A., Huang, D.: A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities. IEEE Commun. Surv. Tutor. 21, 1851\u20131877 (2019). https:\/\/doi.org\/10.1109\/COMST.2019.2891891","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"24_CR19","volume-title":"Blue Book: A Set of Cybersecurity Roadmaps and Challenges for Researchers and Policymakers","author":"E Athanasopoulos","year":"2022","unstructured":"Athanasopoulos, E., et al.: Blue Book: A Set of Cybersecurity Roadmaps and Challenges for Researchers and Policymakers. The CyberSec4Europe Consortium, Athens, Greece (2022)"},{"key":"24_CR20","doi-asserted-by":"publisher","unstructured":"Aslan, \u00d6., Aktu\u011f, S.S., Ozkan-Okay, M., Yilmaz, A.A., Akin, E.: A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions (2023). https:\/\/doi.org\/10.3390\/electronics12061333","DOI":"10.3390\/electronics12061333"},{"key":"24_CR21","doi-asserted-by":"publisher","unstructured":"Cui, A., Stolfo, S.J.: A quantitative analysis of the insecurity of embedded network devices: Results of a wide-area scan. In: Proceedings - Annual Computer Security Applications Conference, ACSAC, pp. 97\u2013106. Association for Computing Machinery, Austin Texas USA (2010). https:\/\/doi.org\/10.1145\/1920261.1920276","DOI":"10.1145\/1920261.1920276"},{"key":"24_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101677","volume":"89","author":"D Bhamare","year":"2020","unstructured":"Bhamare, D., Zolanvari, M., Erbad, A., Jain, R., Khan, K., Meskin, N.: Cybersecurity for industrial control systems: a survey. Comput. Secur. 89, 101677 (2020). https:\/\/doi.org\/10.1016\/j.cose.2019.101677","journal-title":"Comput. Secur."},{"key":"24_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/C2016-0-03251-5","volume-title":"Hardware Security: a Hands-on Learning Approach","author":"S Bhunia","year":"2018","unstructured":"Bhunia, S., Tehranipoor, M.: Hardware Security: a Hands-on Learning Approach. Morgan Kaufmann Publishers, Cambridge, MA, USA (2018). https:\/\/doi.org\/10.1016\/C2016-0-03251-5"},{"key":"24_CR24","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer (Long Beach Calif) 50, 80\u201384 (2017). https:\/\/doi.org\/10.1109\/MC.2017.201","journal-title":"Computer (Long Beach Calif)"},{"key":"24_CR25","volume-title":"Hardware Security Knowledge Area Issue 1.0","author":"I Verbauwhede","year":"2019","unstructured":"Verbauwhede, I.: Hardware Security Knowledge Area Issue 1.0. Leuven, Belgium (2019)"},{"key":"24_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3577200","volume":"22","author":"H Pearce","year":"2023","unstructured":"Pearce, H., Karri, R., Tan, B.: High-level approaches to hardware security: a tutorial. ACM Trans. Embed. Comput. Syst. 22, 1\u201340 (2023). https:\/\/doi.org\/10.1145\/3577200","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"24_CR27","doi-asserted-by":"publisher","first-page":"1107","DOI":"10.3390\/electronics12051107","volume":"12","author":"Z Mirmohammadi","year":"2023","unstructured":"Mirmohammadi, Z., Etemadi Borujeni, S.: A new optimal method for the secure design of combinational circuits against hardware Trojans using interference logic locking. Electronics (Basel) 12, 1107 (2023). https:\/\/doi.org\/10.3390\/electronics12051107","journal-title":"Electronics (Basel)"},{"key":"24_CR28","doi-asserted-by":"publisher","first-page":"4507","DOI":"10.3390\/electronics12214507","volume":"12","author":"M Vidakovi\u0107","year":"2023","unstructured":"Vidakovi\u0107, M., Vinko, D.: Hardware-based methods for electronic device protection against invasive and non-invasive attacks. Electronics (Basel) 12, 4507 (2023). https:\/\/doi.org\/10.3390\/electronics12214507","journal-title":"Electronics (Basel)"},{"key":"24_CR29","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/3512327","volume":"19","author":"M Mattioli","year":"2021","unstructured":"Mattioli, M.: FPGAs in client compute hardware. Queue 19, 66\u201388 (2021). https:\/\/doi.org\/10.1145\/3512327","journal-title":"Queue"},{"key":"24_CR30","doi-asserted-by":"publisher","unstructured":"Covic, A., Ganji, F., Forte, D.: Circuit Masking: From Theory to Standardization, A Comprehensive Survey for Hardware Security Researchers and Practitioners (2021). arXiv preprint. arXiv:2106.12714. https:\/\/doi.org\/10.48550\/arXiv.2106.12714","DOI":"10.48550\/arXiv.2106.12714"},{"key":"24_CR31","doi-asserted-by":"crossref","unstructured":"Mavroudis, V., Cerulli, A., Svenda, P., Cvrcek, D., Klinec, D., Danezis, G.: A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components. (2017)","DOI":"10.1145\/3133956.3133961"},{"key":"24_CR32","doi-asserted-by":"publisher","unstructured":"Sommerhalder, M.: Hardware security module. In: Trends in Data Protection and Encryption Technologies, pp. 83\u201387. Springer Nature Switzerland, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-33386-6_16","DOI":"10.1007\/978-3-031-33386-6_16"},{"key":"24_CR33","doi-asserted-by":"publisher","first-page":"114331","DOI":"10.1109\/ACCESS.2022.3217815","volume":"10","author":"AJ Cabrera-Gutierrez","year":"2022","unstructured":"Cabrera-Gutierrez, A.J., Castillo, E., Escobar-Molero, A., Alvarez-Bermejo, J.A., Morales, D.P., Parrilla, L.: Integration of hardware security modules and permissioned blockchain in industrial IoT networks. IEEE Access. 10, 114331\u2013114345 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3217815","journal-title":"IEEE Access."},{"key":"24_CR34","doi-asserted-by":"publisher","unstructured":"Ning, H., Farha, F., Ullah, A., Mao, L.: Physical unclonable function: architectures, applications and challenges for dependable security (2020). https:\/\/doi.org\/10.1049\/iet-cds.2019.0175","DOI":"10.1049\/iet-cds.2019.0175"},{"key":"24_CR35","unstructured":"Rahman, T., Harun-ur Rashid, A.B.M.: Arbiter PUF: Uniqueness and Reliability Analysis Using Hybrid CMOS-Stanford Memristor Model (2025). arXiv preprint"},{"key":"24_CR36","doi-asserted-by":"publisher","unstructured":"Nozaki, Y., Yoshikawa, M.: Countermeasure of lightweight physical unclonable function against side-channel attack. In: Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019 (2019). https:\/\/doi.org\/10.1109\/CCC.2019.00-13","DOI":"10.1109\/CCC.2019.00-13"},{"key":"24_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2025.103466","volume":"167","author":"M Barbareschi","year":"2025","unstructured":"Barbareschi, M., Cirillo, F., Esposito, C., Mazzocca, N.: Engineering SRAM-PUF on Arduino microcontroller. J. Syst. Architect. 167, 103466 (2025). https:\/\/doi.org\/10.1016\/j.sysarc.2025.103466","journal-title":"J. Syst. Architect."},{"key":"24_CR38","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cdt.2020.0041","author":"M Xue","year":"2020","unstructured":"Xue, M., Gu, C., Liu, W., Yu, S., O\u2019Neill, M.: Ten years of hardware Trojans: A survey from the attacker\u2019s perspective (2020). https:\/\/doi.org\/10.1049\/iet-cdt.2020.0041","journal-title":"Ten years of hardware Trojans: A survey from the attacker\u2019s perspective"},{"key":"24_CR39","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/j.jare.2013.11.008","volume":"5","author":"HAM Amin","year":"2014","unstructured":"Amin, H.A.M., Alkabani, Y., Selim, G.M.I.: System-level protection and hardware Trojan detection using weighted voting. J. Adv. Res. 5, 499\u2013505 (2014). https:\/\/doi.org\/10.1016\/j.jare.2013.11.008","journal-title":"J. Adv. Res."},{"key":"24_CR40","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1109\/JPROC.2014.2332291","volume":"102","author":"U Guin","year":"2014","unstructured":"Guin, U., Huang, K., Dimase, D., Carulli, J.M., Tehranipoor, M., Makris, Y.: Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain. Proc. IEEE 102, 1207\u20131228 (2014). https:\/\/doi.org\/10.1109\/JPROC.2014.2332291","journal-title":"Proc. IEEE"},{"key":"24_CR41","doi-asserted-by":"publisher","unstructured":"Katte, S.R., Fernandez, K.E.: A Survey Report on Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis (2023). arXiv preprint. arXiv:2307.02012. https:\/\/doi.org\/10.48550\/arXiv.2307.02012","DOI":"10.48550\/arXiv.2307.02012"},{"key":"24_CR42","doi-asserted-by":"publisher","unstructured":"Mishra, J., Sahay, S.K.: Modern Hardware Security: A Review of Attacks and Countermeasures (2025). arXiv preprint: arXiv:2501.04394. https:\/\/doi.org\/10.48550\/arXiv.2501.04394","DOI":"10.48550\/arXiv.2501.04394"},{"key":"24_CR43","doi-asserted-by":"publisher","unstructured":"Zhang, L., Vega, L., Taylor, T.: Power Side Channels in Security ICs: Hardware Countermeasures (2016). arXiv preprint. arXiv:1605.00681. https:\/\/doi.org\/10.48550\/arXiv.2501.04394","DOI":"10.48550\/arXiv.2501.04394"},{"key":"24_CR44","doi-asserted-by":"publisher","unstructured":"Perkins, G., Macht, B., Ritzdorf, L., Crane, T.R., LaMeres, B., Izurieta, C., Reinhold, A.M.: SoK: Trusted Execution in SoC-FPGAs (2025). arXiv preprint: arXiv:2503.16612v1. https:\/\/doi.org\/10.48550\/arXiv.2503.16612","DOI":"10.48550\/arXiv.2503.16612"},{"key":"24_CR45","doi-asserted-by":"publisher","unstructured":"Streit, F.J., Fritz, F., Becher, A., Wildermann, S., Werner, S., Schmidt-Korth, M., Pschyklenk, M., Teich, J.: Secure boot from non-volatile memory for programmable SoC architectures. In: the IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020, pp. 102\u2013110. IEEE, San Jose, CA. (2020). https:\/\/doi.org\/10.1109\/HOST45689.2020.9300126","DOI":"10.1109\/HOST45689.2020.9300126"},{"key":"24_CR46","doi-asserted-by":"publisher","first-page":"77543","DOI":"10.1109\/ACCESS.2023.3288696","volume":"11","author":"S Akter","year":"2023","unstructured":"Akter, S., Khalil, K., Bayoumi, M.: A survey on hardware security: current trends and challenges. IEEE Access. 11, 77543\u201377565 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3288696","journal-title":"IEEE Access."},{"key":"24_CR47","doi-asserted-by":"publisher","unstructured":"Parikh, R., Parikh, K.: Survey on Hardware Security: PUFs, Trojans, and Side-Channel Attacks. preprints.org. pp. 1\u201311 (2025). https:\/\/doi.org\/10.20944\/preprints202501.1559.v1","DOI":"10.20944\/preprints202501.1559.v1"},{"key":"24_CR48","doi-asserted-by":"publisher","unstructured":"Sayadi, H., He, Z., Makrani, H.M., Homayoun, H.: Intelligent malware detection based on hardware performance counters: a comprehensive survey. In: 2024 25th International Symposium on Quality Electronic Design (ISQED), pp. 1\u201310. IEEE, San Francisco, CA, USA (2024). https:\/\/doi.org\/10.1109\/ISQED60706.2024.10528369","DOI":"10.1109\/ISQED60706.2024.10528369"},{"key":"24_CR49","doi-asserted-by":"publisher","unstructured":"Faruque, M. Al, Regazzoni, F., Pajic, M.: Design methodologies for securing cyber-physical systems. In: 2015 International Conference on Hardware\/Software Codesign and System Synthesis, CODES+ISSS 2015. IEEE, Amsterdam, Netherlands (2015). https:\/\/doi.org\/10.1109\/CODESISSS.2015.7331365","DOI":"10.1109\/CODESISSS.2015.7331365"},{"key":"24_CR50","doi-asserted-by":"publisher","unstructured":"Dessouky, G., Gens, D., Haney, P., Persyn, G., Kanuparthi, A., Khattri, H., Fung, J.M., Sadeghi, A.-R., Rajendran, J.: When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs (2018). arXiv preprint. arXiv:1812.00197. https:\/\/doi.org\/10.48550\/arXiv.1812.00197","DOI":"10.48550\/arXiv.1812.00197"},{"key":"24_CR51","doi-asserted-by":"publisher","first-page":"22351","DOI":"10.1109\/JIOT.2024.3380822","volume":"11","author":"Q Zeng","year":"2024","unstructured":"Zeng, Q., Hara-Azumi, Y.: Hardware\/Software codesign of real-time intrusion detection system for internet of things devices. IEEE Internet Things J. 11, 22351\u201322363 (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3380822","journal-title":"IEEE Internet Things J."},{"key":"24_CR52","doi-asserted-by":"publisher","unstructured":"Plaka, R., Asplund, M., Nadjm-Tehrani, S.: Vulnerability Analysis of\u00a0an\u00a0Electric Vehicle Charging Ecosystem. In: Bertino, E., Gao, W., Steffen, B., and Yung, M. (eds.) The series Lecture Notes in Computer Science (LNCS), pp. 155\u2013173. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-62139-0_9","DOI":"10.1007\/978-3-031-62139-0_9"},{"key":"24_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2025.104435","volume":"81","author":"SB Mitikiri","year":"2025","unstructured":"Mitikiri, S.B., et al.: Cyber\u2013physical security in EV charging infrastructure: components, vulnerabilities, and defense strategies. Sustain. Energy Technol. Assess. 81, 104435 (2025). https:\/\/doi.org\/10.1016\/j.seta.2025.104435","journal-title":"Sustain. Energy Technol. Assess."},{"key":"24_CR54","doi-asserted-by":"publisher","unstructured":"Girdhar, M., Hong, J., Yoo, Y., Song, T.J.: Machine learning-enabled cyber attack prediction and mitigation for EV charging stations. In: IEEE Power and Energy Society General Meeting, pp. 1\u20135. IEEE (2022). https:\/\/doi.org\/10.1109\/PESGM48719.2022.9916914","DOI":"10.1109\/PESGM48719.2022.9916914"},{"key":"24_CR55","doi-asserted-by":"publisher","first-page":"4639","DOI":"10.1109\/JESTPE.2020.3045667","volume":"9","author":"J Ye","year":"2021","unstructured":"Ye, J., et al.: Cyber-physical security of powertrain systems in modern electric vehicles: vulnerabilities, challenges, and future visions. IEEE J. Emerg. Sel. Top. Power Electron. 9, 4639\u20134657 (2021). https:\/\/doi.org\/10.1109\/JESTPE.2020.3045667","journal-title":"IEEE J. Emerg. Sel. Top. Power Electron."},{"key":"24_CR56","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1117\/12.2629096","volume-title":"International conference on internet of things and machine learning (IoTML 2021)","author":"C Li","year":"2022","unstructured":"Li, C., Li, B., Sun, H.: Research on cybersecurity protection strategy of electric vehicles charging systems. In: Kar, P., Guan, S. (eds.) International conference on internet of things and machine learning (IoTML 2021), pp. 138\u2013143. Shanghai, China (2022). https:\/\/doi.org\/10.1117\/12.2629096"},{"key":"24_CR57","doi-asserted-by":"publisher","first-page":"3816","DOI":"10.3390\/en14133816","volume":"14","author":"A Buczacki","year":"2021","unstructured":"Buczacki, A., Pi\u0105tek, P.: Proposal for an integrated framework for electronic control unit design in the automotive industry. Energies (Basel) 14, 3816 (2021). https:\/\/doi.org\/10.3390\/en14133816","journal-title":"Energies (Basel)"},{"key":"24_CR58","doi-asserted-by":"publisher","unstructured":"Sanghvi, A., Markel, T.: Cybersecurity for electric vehicle fast-charging infrastructure. In: 2021 IEEE Transportation Electrification Conference and Expo, ITEC 2021, pp. 573\u2013576. IEEE, Chicago, IL, USA (2021). https:\/\/doi.org\/10.1109\/ITEC51675.2021.9490069","DOI":"10.1109\/ITEC51675.2021.9490069"},{"key":"24_CR59","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2023.100016","volume":"1","author":"M Javaid","year":"2023","unstructured":"Javaid, M., Haleem, A., Singh, R.P., Suman, R.: Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends. Cyber Secur. Appl. 1, 100016 (2023). https:\/\/doi.org\/10.1016\/j.csa.2023.100016","journal-title":"Cyber Secur. Appl."},{"key":"24_CR60","doi-asserted-by":"publisher","first-page":"1466","DOI":"10.3390\/pr13051466","volume":"13","author":"X Wang","year":"2025","unstructured":"Wang, X., Yue, X., Tariq, N., Sajid, A.: Hybrid ai- and blockchain-powered secure internet hospital communication and anomaly detection in smart cities. Processes 13, 1466 (2025). https:\/\/doi.org\/10.3390\/pr13051466","journal-title":"Processes"},{"key":"24_CR61","first-page":"1i","volume":"19","author":"LH Yeo","year":"2022","unstructured":"Yeo, L.H., Banfield, J.: Human factors in electronic health records cybersecurity breach: an exploratory analysis. Perspect. Health Inf. Manag. 19, 1i (2022)","journal-title":"Perspect. Health Inf. Manag."},{"key":"24_CR62","unstructured":"Sathaye, H., Strohmeier, M., Lenders, V., Ranganathan, A.: An experimental study of GPS spoofing and takeover attacks on UAVs. In: The 31st USENIX Security Symposium, Security 2022, pp. 3503\u20133520. USENIX Association, Boston, MA, USA (2022)"},{"key":"24_CR63","doi-asserted-by":"publisher","first-page":"71","DOI":"10.9734\/jerr\/2024\/v26i101291","volume":"26","author":"PC Joeaneke","year":"2024","unstructured":"Joeaneke, P.C., Obioha-Val, O., Olaniyi, O.O., Ogungbemi, O.S., Olisa, A.O., Akinola, O.I.: Protecting autonomous UAVs from GPS spoofing and jamming: a comparative analysis of detection and mitigation techniques. J. Eng. Rese. Rep. 26, 71\u201392 (2024). https:\/\/doi.org\/10.9734\/jerr\/2024\/v26i101291","journal-title":"J. Eng. Rese. Rep."},{"key":"24_CR64","doi-asserted-by":"publisher","first-page":"171166","DOI":"10.1109\/ACCESS.2024.3495994","volume":"12","author":"E Marchetti","year":"2024","unstructured":"Marchetti, E., Waheed, T., Calabr\u00f2, A.: Cybersecurity testing in drones domain: a systematic literature review. IEEE Access 12, 171166\u2013171184 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3495994","journal-title":"IEEE Access"},{"key":"24_CR65","doi-asserted-by":"publisher","first-page":"4210","DOI":"10.3390\/s24134210","volume":"24","author":"K Rado\u0161","year":"2024","unstructured":"Rado\u0161, K., Brki\u0107, M., Begu\u0161i\u0107, D.: Recent advances on jamming and spoofing detection in GNSS. Sensors 24, 4210 (2024). https:\/\/doi.org\/10.3390\/s24134210","journal-title":"Sensors"},{"key":"24_CR66","unstructured":"Tao, Z., Rastogi, A., Gupta, N., Vaswani, K., Thakur, A. V.: DICE*: A formally verified implementation of DICE measured boot. In: The 30th USENIX Security Symposium, pp. 1091\u20131107. USENIX Association, Berkeley, California, United States (2021)"},{"key":"24_CR67","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1109\/COMST.2024.3355168","volume":"26","author":"A Cirne","year":"2024","unstructured":"Cirne, A., Sousa, P.R., Resende, J.S., Antunes, L.: Hardware security for Internet of Things identity assurance. IEEE Commun. Surv. Tutor. 26, 1041\u20131079 (2024). https:\/\/doi.org\/10.1109\/COMST.2024.3355168","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"24_CR68","doi-asserted-by":"publisher","unstructured":"Korenda, A.R., Afghah, F., Cambou, B., Philabaum, C.: A PROOF OF CONCEPT SRAM-based physically unclonable function (PUF) key generation mechanism for IoT devices. In: Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks workshops, pp. 1\u20138. IEEE, Boston, MA, USA (2019). https:\/\/doi.org\/10.1109\/SAHCN.2019.8824887","DOI":"10.1109\/SAHCN.2019.8824887"},{"key":"24_CR69","doi-asserted-by":"publisher","unstructured":"Anton, S.D., Fraunholz, D., Schotten, H.D., Teuber, S.: A question of context: enhancing intrusion detection by providing context information. In: 2017 Internet of Things Business Models, Users, and Networks. IEEE, Copenhagen, Denmark (2017). https:\/\/doi.org\/10.1109\/CTTE.2017.8260938","DOI":"10.1109\/CTTE.2017.8260938"},{"key":"24_CR70","doi-asserted-by":"publisher","first-page":"2395","DOI":"10.3390\/s25082395","volume":"25","author":"T Zhukabayeva","year":"2025","unstructured":"Zhukabayeva, T., Ahmad, Z., Adamova, A., Karabayev, N., Abdildayeva, A.: An edge-computing-based integrated framework for network traffic analysis and intrusion detection to enhance cyber-physical system security in industrial IoT. Sensors 25, 2395 (2025). https:\/\/doi.org\/10.3390\/s25082395","journal-title":"Sensors"},{"key":"24_CR71","doi-asserted-by":"publisher","unstructured":"Kokila, J., Ramasubramanian, N., Indrajeet, S.: A survey of hardware and software co-design issues for system on chip design. In: Advances in Intelligent Systems and Computing, pp. 41\u201349. Springer Singapore, Singapore (2016). https:\/\/doi.org\/10.1007\/978-981-10-1023-1_4","DOI":"10.1007\/978-981-10-1023-1_4"},{"key":"24_CR72","doi-asserted-by":"publisher","unstructured":"Zhou, Y., Baras, J., Wang, S.: Hardware Software Co-design for Automotive CPS using Architecture Analysis and Design Language (2016). arXiv preprint . arXiv:1603.05069. https:\/\/doi.org\/10.48550\/arXiv.1603.05069","DOI":"10.48550\/arXiv.1603.05069"},{"key":"24_CR73","unstructured":"Canali, D., Balzarotti, D.: Behind the scenes of online attacks: an analysis of exploitation behaviors on the web. In: 20th Annual Network and Distributed System Security Symposium, NDSS 2013. San Diego, United States (2013)"},{"key":"24_CR74","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/MDAT.2021.3063338","volume":"38","author":"B Zhou","year":"2021","unstructured":"Zhou, B., Gupta, A., Jahanshahi, R., Egele, M., Joshi, A.: A cautionary tale about detecting malware using hardware performance counters and machine learning. IEEE Des. Test. 38, 39\u201350 (2021). https:\/\/doi.org\/10.1109\/MDAT.2021.3063338","journal-title":"IEEE Des. Test."},{"key":"24_CR75","doi-asserted-by":"publisher","unstructured":"Foreman, J.C.: A Survey of Cyber Security Countermeasures using Hardware Performance Counters (2018). arXiv preprint . arXiv:1807.10868. https:\/\/doi.org\/10.48550\/arXiv.1807.10868","DOI":"10.48550\/arXiv.1807.10868"},{"key":"24_CR76","doi-asserted-by":"publisher","first-page":"63865","DOI":"10.1109\/ACCESS.2024.3395491","volume":"12","author":"JE Hill","year":"2024","unstructured":"Hill, J.E., Owens Walker, T., Blanco, J.A., Ives, R.W., Rakvic, R., Jacob, B.: Ransomware classification using hardware performance counters on a non-virtualized system. IEEE Access 12, 63865\u201363884 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3395491","journal-title":"IEEE Access"},{"key":"24_CR77","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3663673","volume":"23","author":"P Bhade","year":"2024","unstructured":"Bhade, P., Paturel, J., Sentieys, O., Sinha, S.: Lightweight hardware-based cache side-channel attack detection for edge devices (edge-CaSCADe). ACM Trans. Embed. Comput. Syst. 23, 1\u201327 (2024). https:\/\/doi.org\/10.1145\/3663673","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"24_CR78","unstructured":"Cheng, B., Leal, E.A., Zhang, H., Ming, J.: On the feasibility of malware unpacking via hardware-assisted loop profiling. In: 32nd USENIX Security Symposium, USENIX Security 2023, pp. 7481\u20137498. SENIX Association, Anaheim CA USA (2023)"},{"key":"24_CR79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-58687-3","volume-title":"Hardware Security-A Look into the Future","author":"M Tehranipoor","year":"2024","unstructured":"Tehranipoor, M., Zamiri Azar, K., Asadizanjani, N., Rahman, F., Mardani Kamali, H., Farahmandi, F.: Hardware Security-A Look into the Future. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58687-3"},{"key":"24_CR80","doi-asserted-by":"publisher","unstructured":"Sheikh, A.T., Shoker, A., Esteves-Verissimo, P.: Resilient and secure system on chip with rejuvenation in the wake of persistent attacks. In: Proceedings of the 16th European Workshop on System Security, pp. 37\u201343. ACM, New York, NY, USA (2023). https:\/\/doi.org\/10.1145\/3578357.3589456","DOI":"10.1145\/3578357.3589456"},{"key":"24_CR81","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102920","volume":"123","author":"IP Gouveia","year":"2022","unstructured":"Gouveia, I.P., V\u00f6lp, M., Esteves-Verissimo, P.: Behind the last line of defense: surviving SoC faults and intrusions. Comput. Secur. 123, 102920 (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102920","journal-title":"Comput. Secur."},{"key":"24_CR82","doi-asserted-by":"publisher","unstructured":"Gouveia, I.P., Sheikh, A.T., Shoker, A., Fahmy, S.A., Esteves-Verissimo, P.: Resilient and secure programmable system-on-chip accelerator offload. In: 2024 43rd International Symposium on Reliable Distributed Systems (SRDS), pp. 52\u201365. IEEE, Charlotte, NC, USA (2024). https:\/\/doi.org\/10.1109\/SRDS64841.2024.00016","DOI":"10.1109\/SRDS64841.2024.00016"}],"container-title":["Communications in Computer and Information Science","Innovative Intelligent Industrial Production and Logistics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-15576-4_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T11:42:39Z","timestamp":1770032559000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-15576-4_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032155757","9783032155764"],"references-count":82,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-15576-4_24","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"3 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests."}},{"value":"IN4PL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Intelligent Industrial Production and Logistics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Marbella","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"in4pl2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/in4pl.scitevents.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}