{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T08:00:04Z","timestamp":1773907204166,"version":"3.50.1"},"reference-count":266,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Funds through the Portuguese funding agency, Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["LA\/P\/0063\/2020 - DOI 10.54499\/LA\/P\/0063\/2020"],"award-info":[{"award-number":["LA\/P\/0063\/2020 - DOI 10.54499\/LA\/P\/0063\/2020"]}]},{"DOI":"10.13039\/501100001871","name":"FCT, Portugal","doi-asserted-by":"publisher","award":["2021.08587.BD"],"award-info":[{"award-number":["2021.08587.BD"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/comst.2024.3355168","type":"journal-article","created":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T18:39:09Z","timestamp":1705516749000},"page":"1041-1079","source":"Crossref","is-referenced-by-count":38,"title":["Hardware Security for Internet of Things Identity Assurance"],"prefix":"10.1109","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3433-9809","authenticated-orcid":false,"given":"Andr\u00e9","family":"Cirne","sequence":"first","affiliation":[{"name":"Dep. de Ci&#x00EA;ncia de Computadores, Faculdade de Ci&#x00EA;ncias, Universidade do Porto, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0268-9134","authenticated-orcid":false,"given":"Patr\u00edcia R.","family":"Sousa","sequence":"additional","affiliation":[{"name":"INSIGHTSEC, Lda, Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0125-4240","authenticated-orcid":false,"given":"Jo\u00e3o S.","family":"Resende","sequence":"additional","affiliation":[{"name":"Dep. de Ci&#x00EA;ncia de Computadores, Faculdade de Ci&#x00EA;ncias, Universidade do Porto, Porto, Portugal"}]},{"given":"Lu\u00eds","family":"Antunes","sequence":"additional","affiliation":[{"name":"Dep. de Ci&#x00EA;ncia de Computadores, Faculdade de Ci&#x00EA;ncias, Universidade do Porto, Porto, Portugal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/mspec.2016.7572524"},{"key":"ref2","volume-title":"IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things","author":"Hanes","year":"2017"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701310"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2689040"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.500-325"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102779"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0100611"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT.2017.8320166"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/FTC.2016.7821686"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICED.2016.7804660"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102669"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2014.58"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00263"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0029-7"},{"key":"ref15","volume-title":"Cyber-Physical Attacks: A Growing Invisible Threat","author":"Loukas","year":"2015"},{"issue":"3","key":"ref16","doi-asserted-by":"crossref","first-page":"42","DOI":"10.3390\/jsan8030042","article-title":"Hardware security in IoT devices with emphasis on hardware trojans","volume":"8","author":"Sidhu","year":"2019","journal-title":"J. Sens. Actuat. Netw."},{"key":"ref17","volume-title":"The Hardware Hacking Handbook","author":"van Woudenberg","year":"2021"},{"key":"ref18","volume-title":"Physically Unclonable Functions: Constructions, Properties and Applications","author":"Roel","year":"2012"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761062"},{"issue":"20","key":"ref20","doi-asserted-by":"crossref","first-page":"5729","DOI":"10.3390\/s20205729","article-title":"Hardware security of fog end-devices for the Internet of Things","volume":"20","author":"Butun","year":"2020","journal-title":"Sensors"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2019.8916486"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3047976"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3437120.3437322"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/METROI4.2019.8792895"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3288696"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2017.4241357"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2896-8"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0060"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2015.12.114"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2015.07.035"},{"key":"ref31","volume-title":"NGN Identity Management Framework","year":"2009"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1201\/9780429466335"},{"key":"ref33","first-page":"117","volume-title":"PUF-Based Entity Identification and Authentication","author":"Maes","year":"2013"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2010.28"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICITIS.2010.5689468"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1062745.1062916"},{"key":"ref37","first-page":"96","volume-title":"Federated Identity Management","author":"Chadwick","year":"2009"},{"key":"ref38","volume-title":"Metadata for the OASIS Security Assertion Markup Language (SAML) V2.0","author":"Cantor","year":"2005"},{"key":"ref39","first-page":"S3","volume-title":"OpenID Connect Core 1.0","author":"Sakimura","year":"2014"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.4018\/IJSPPC.2020070104"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.26869\/TI.66.1"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-07-2018-0148"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.17487\/rfc6749","volume-title":"The OAuth 2.0 authorization framework","author":"Hardt","year":"2012"},{"key":"ref44","first-page":"77","article-title":"User centric identity management","volume-title":"Proc. AusCERT Asia\u2013Pacific Inf. Technol. Security Conf.","author":"J\u00f8sang"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.comnet.2017.04.030","article-title":"Cloud identity management: A survey on privacy strategies","volume":"122","author":"Werner","year":"2017","journal-title":"Comput. Netw."},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.18517\/ijaseit.8.4-2.6838"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2018.10.002"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.020"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14478-3_43"},{"key":"ref50","first-page":"18","article-title":"Identity in the Internet-of-Things (IoT): New challenges and opportunities","volume-title":"Proc. Int. Conf. Inf. Commun. Security","author":"Lam"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947723"},{"issue":"5","key":"ref53","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.3390\/s19051141","article-title":"A survey of Internet of Things (IoT) authentication schemes","volume":"19","author":"El-hajj","year":"2019","journal-title":"Sensors"},{"key":"ref54","first-page":"455","article-title":"Giving IoT services an identity and changeable attributes","volume-title":"Proc. IFIP\/IEEE Symp. Integr. Netw. Service Manag. (IM)","author":"Pahl"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3011051"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.145"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.291"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.3390\/sym11060774"},{"key":"ref59","first-page":"7","volume-title":"Lightweight Cryptography for the Internet of Things","author":"Katagi","year":"2008"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.213"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2046347"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2199141"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.7628r1"},{"issue":"2","key":"ref64","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/j.dam.2005.03.024","article-title":"Provably secure non-interactive key distribution based on pairings","volume":"154","author":"Dupont","year":"2006","journal-title":"Discr. Appl. Math."},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2628090"},{"key":"ref66","volume-title":"Threat Modeling: Designing for Security","author":"Shostack","year":"2014"},{"key":"ref67","volume-title":"ISO\/IEC JTC 1\/SC 27: Information Security, Cybersecurity and Privacy Protection\u2014Evaluation Criteria for IT Security","year":"2022"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.21"},{"key":"ref69","volume-title":"Computers as Components","author":"Wolf","year":"2008"},{"key":"ref70","volume-title":"Landis+Gyr residential meter","year":"2020"},{"key":"ref71","volume-title":"Communication Systems for Meters\u2014Part 2: Physical and Link Layer","year":"2018"},{"key":"ref72","first-page":"5","volume-title":"Power On and Bootloader","author":"Gu","year":"2016"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.140-2"},{"key":"ref74","article-title":"Enhancing the conditional access module security in light of smart card sharing attacks","volume":"20","author":"Markantonakis"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-150"},{"key":"ref76","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/B978-0-12-394436-8.00003-5","article-title":"Chapter 3\u2014Security risk management","volume-title":"Security Science","author":"Smith","year":"2013"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1201\/b18335"},{"key":"ref78","article-title":"Semi-invasive attacks: A new approach to hardware security analysis","author":"Skorobogatov","year":"2005"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2018.8494856"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1985.6313354"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_26"},{"key":"ref82","volume-title":"Secure integrated circuit chip with conductive shield","author":"Gilberg","year":"1990"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44499-8_24"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224333"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/irps48227.2022.9764485"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2017.69"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176538"},{"key":"ref88","first-page":"9","article-title":"Design principles for tamperresistant smartcard processors","volume-title":"Proc. Smartcard","author":"K\u00f6mmerling"},{"key":"ref89","volume-title":"Getting root on Philips hue bridge 2.0","author":"O\u2019Flynn","year":"2016"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2016.18"},{"key":"ref91","first-page":"1","article-title":"Secure application programming in the presence of side channel attacks","volume-title":"Proc. RSA Conf.","author":"Witteman"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2012.12"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2021.3073946"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2014.216"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2014.6858423"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TCPMT.2018.2877211"},{"key":"ref97","first-page":"193","article-title":"Chapter 8\u2014Side-channel attacks","volume-title":"Hardware Security","author":"Bhunia","year":"2019"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.01.010"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/10721064_15"},{"key":"ref100","first-page":"388","article-title":"Differential power analysis","volume-title":"Proc. Annu. Int. Cryptol. Conf.","author":"Kocher"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40026-1_1"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_3"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1515\/itit-2016-0051"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744852"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/81.847868"},{"key":"ref107","article-title":"Biasing a ring-oscillator based true random number generator with an electro-magnetic fault injection using harmonic waves","author":"Senden","year":"2015"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2013.6572251"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/3390566.3391670"},{"issue":"5","key":"ref110","first-page":"103","article-title":"Memory types","volume":"14","author":"Barr","year":"2001","journal-title":"Embedded Syst. Program."},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1201\/9781003339182-4"},{"key":"ref112","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/B978-1-85617-507-4.00015-2","article-title":"Chapter 15\u2014Memory ICs","volume-title":"Bebop to the Boolean Boogie","author":"Maxfield","year":"2009"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1967.tb01738.x"},{"key":"ref114","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/B978-1-85617-507-4.00016-4","article-title":"Chapter 16\u2014Programmable ICs","volume-title":"Bebop to the Boolean Boogie","author":"Maxfield","year":"2009"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1147\/rd.511.0065"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/RTEICT46194.2019.9016746"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2009.37"},{"key":"ref118","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/B978-0-12-802122-4.00004-3","article-title":"Chapter 4\u2014Resilience against physical attacks","volume-title":"Smart Grid Security","author":"Hutle","year":"2015"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8080-9_7"},{"key":"ref120","first-page":"217","volume-title":"Smart Card Security","author":"Tunstall","year":"2017"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/IMCOM48794.2020.9001713"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501655"},{"key":"ref123","first-page":"1","volume-title":"Intel advanced encryption standard (AES) instructions set","volume":"3","author":"Gueron","year":"2010"},{"key":"ref124","volume-title":"ARMv8\u2014A Architecture Reference Manual","year":"2015"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-38162-6"},{"key":"ref126","first-page":"1331","volume-title":"Trusted Computing Group","author":"Rotondo","year":"2011"},{"key":"ref127","volume-title":"Trusted Platform Module Basics: Using TPM in Embedded Systems","author":"Kinney","year":"2006"},{"key":"ref128","volume-title":"Trusted platform module library part 1: Architecture","year":"2019"},{"key":"ref129","volume-title":"TPM 2.0 mobile common profile","year":"2015"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"ref131","article-title":"Side-channel protections for cryptographic instruction set extensions","author":"Saab","year":"2016"},{"key":"ref132","article-title":"Attacking hardware AES with DFA","author":"Lu","year":"2019","journal-title":"arXiv:1902.08693"},{"key":"ref133","volume-title":"Profile PC client specific trusted platform module TPM family 2.0","year":"2021"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/icpads51040.2020.00057"},{"key":"ref135","first-page":"111","volume-title":"An Approach to Integrating Security and Fault Tolerance Mechanisms into the Military IoT","author":"Zieliski","year":"2019"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02617-1_7"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/cse.2009.30"},{"key":"ref138","volume-title":"Introduction to Secure Elements","year":"2018"},{"key":"ref139","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-50500-8_18","volume-title":"Trusted Execution Environment and Host Card Emulation","author":"Umar","year":"2017"},{"key":"ref140","volume-title":"P5Cx012\/02x\/40\/73\/80\/144 family: Secure dual interface and contact PKI smart card controller","year":"2008"},{"key":"ref141","first-page":"1","article-title":"Implementing NFC service security\u2014SE VS TEE VS HCE","volume-title":"Proc. SYMORG Conf.","author":"Lepojevic"},{"key":"ref142","first-page":"93","volume-title":"Smart Cards and Security for Mobile Communications","author":"Mayes","year":"2017"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-38162-6"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50500-8_3"},{"key":"ref145","volume-title":"Common criteria certification of a smartcard: A technical overview","author":"Lomne","year":"2016"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3003998"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/ITC-CSCC.2019.8793333"},{"key":"ref148","volume-title":"Bosch IP Video and Data Security Guidebook"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2014.7005086"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2014.7038800"},{"key":"ref151","first-page":"1","article-title":"Improving security of autonomous UAVs fleets by using new specific embedded secure elements\u2014A position paper","volume-title":"Proc. 2nd AETOS Int. Conf. Res. Challenges future RPAS\/UAV Syst.","author":"Akram"},{"key":"ref152","volume-title":"TEE system architecture","year":"2018"},{"key":"ref153","first-page":"159","article-title":"Trustworthy execution on mobile devices: What security properties can my mobile platform give me?","volume-title":"Proc. Int. Conf. Trust Trustworthy Comput.","author":"Vasudevan"},{"key":"ref154","volume-title":"Trusted user interface API","year":"2013"},{"key":"ref155","author":"Alves","year":"2004","journal-title":"TrustZone: Integrated hardware and software security"},{"key":"ref156","article-title":"Intel SGX explained","author":"Costan","year":"2016"},{"key":"ref157","volume-title":"Rising to the Challenge\u2014 Data Security With Intel Confidential Computing","author":"Rao","year":"2022"},{"key":"ref158","volume-title":"Azure announces next generation Intel SGX confidential computing VMs","author":"McReynolds","year":"2021"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1145\/3426020.3426113"},{"key":"ref161","volume-title":"Open portable trusted execution environment","year":"2013"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.400"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.34"},{"key":"ref164","first-page":"549","article-title":"ARMageddon: Cache attacks on mobile devices","volume-title":"Proc. 25th USENIX Security Symp. (USENIX Security)","author":"Lipp"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.11"},{"key":"ref166","article-title":"TruSpy: Cache side-channel information leakage from the secure world on arm devices","author":"Zhang","year":"2016"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23227"},{"key":"ref168","first-page":"2","article-title":"Always-trusted IoT\u2014Making IoT devices trusted with minimal overhead","volume-title":"Proc. 5th Workshop Syst. Softw. Trust. Execution","author":"Istv\u00e1n"},{"key":"ref169","volume-title":"Linux-SGX","year":"2015"},{"key":"ref170","article-title":"A survey of published attacks on Intel SGX","author":"Nilsson","year":"2020","journal-title":"arXiv:2006.13598"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102327"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_9"},{"key":"ref173","volume-title":"Protecting information processing system secrets from debug attacks","author":"Shanbhogue","year":"2015"},{"key":"ref174","first-page":"557","article-title":"Inferring fine-grained control flow inside {SGX} enclaves with branch shadowing","volume-title":"Proc. 26th USENIX Security Symp. (USENIX Security)","author":"Lee"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"ref176","first-page":"973","article-title":"Meltdown: Reading kernel memory from user space","volume-title":"Proc. 27th USENIX Security Symp. (USENIX Security)","author":"Lipp"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00020"},{"key":"ref178","first-page":"991","article-title":"Foreshadow: Extracting the keys to the Intel {SGX} kingdom with transient out-of-order execution","volume-title":"Proc. 27th USENIX Security Symp. (USENIX Security)","author":"Van Bulck"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363219"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00087"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354252"},{"key":"ref182","article-title":"SGX attestation process","author":"Vill","year":"2017"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363206"},{"key":"ref184","volume-title":"National vulnerability database","year":"2022"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00061"},{"key":"ref186","first-page":"1","article-title":"Software grand exposure: SGX cache attacks are practical","volume-title":"Proc. 11th USENIX Workshop Offensive Technol. (WOOT)","author":"Brasser"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_4"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93524-9_6"},{"key":"ref189","first-page":"699","article-title":"VoltPillager: Hardware-based fault injection attacks against Intel SGX enclaves using the SVID voltage scaling interface","volume-title":"Proc. 30th USENIX Security Symp. (USENIX Security)","author":"Chen"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2016.124"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2015.7392493"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102240"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2750067"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1145\/3365871.3365876"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1007\/11507840_15"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_28"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2015.7210391"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1145\/3102304.3102312"},{"key":"ref200","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102491","article-title":"Authentication and identity management of IoHT devices: Achievements, challenges, and future directions","volume":"111","author":"Mamdouh","year":"2021","journal-title":"Comput. Security"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2014.6778915"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14452-3_4"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2014.360"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.19"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866335"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2427259"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2020.i3.97-120"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0522"},{"key":"ref211","article-title":"Combined modeling and side channel attacks on strong PUFs","author":"Mahmoud","year":"2013"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495550"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1145\/2818186"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-016-9228-6"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1145\/2072274.2072276"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2019.8824887"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSS.2011.6060013"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2016.2544845"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC46108.2020.9045264"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04474-8_22"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176287"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2012.30"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2013.2290845"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_9"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2016.2553027"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2740297"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.3390\/sym10080352"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2832201"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3098496"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-019-00677-x"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2014.2370531"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107593"},{"key":"ref236","first-page":"407","volume-title":"Robust Key Extraction from Physical Uncloneable Functions","author":"\u0160kori\u00b4c","year":"2005"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5225058"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.22"},{"key":"ref239","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","volume-title":"Proc. 44th ACM\/IEEE Design Autom. Conf.","author":"Suh"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1145\/2046582.2046594"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2013.6572128"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2019.2938462"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2020.9144691"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2012.6167440"},{"key":"ref245","volume-title":"ESP32-C3 datasheet","year":"2021"},{"key":"ref246","volume-title":"ESP32-H2 datasheet","year":"2021"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"ref248","volume-title":"ESP-C3-13 specification","year":"2021"},{"key":"ref249","volume-title":"ESP-IDF Startup API Guide","year":"2016"},{"key":"ref250","article-title":"MDK.","author":"Lyubka","year":"2022"},{"key":"ref251","volume-title":"SPST CMOS analog switches","year":"2006"},{"key":"ref252","volume-title":"ChipWhisperer-Nano","year":"2022"},{"key":"ref253","volume-title":"Riscure: CVE-2019-17391","year":"2019"},{"key":"ref254","volume-title":"Saleae logic 8 logic analyzer","year":"2023"},{"key":"ref255","volume-title":"FTDI FT232H datasheet","year":"2019"},{"key":"ref256","volume-title":"Security advisory concerning breaking the hardware AESCore and firmware encryption of ESP32-ECOV3 ThroughSide channel attack","year":"2022"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2005.213"},{"key":"ref258","volume-title":"XGecu TL866II plus","year":"2023"},{"key":"ref259","volume-title":"Understanding in-circuit EEPROM and microcontroller reading and programming","year":"2023"},{"key":"ref260","volume-title":"National security agency: Ghidra","year":"2019"},{"key":"ref261","volume-title":"ESP32-Arduino Sketch and Encryption With ESP-IDF","year":"2021"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1007\/0-306-48709-8_14"},{"key":"ref263","first-page":"44","article-title":"Securing the Internet of Things from the bottom up using physical unclonable functions","volume-title":"Proc. Cloud Comput.","author":"Lathrop"},{"key":"ref264","volume-title":"Trusted firmware","year":"2013"},{"key":"ref265","volume-title":"HKG18-212\u2014Trusted firmware M: Introduction","author":"King","year":"2018"},{"key":"ref266","volume-title":"MCUBOOT","year":"2017"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/10536630\/10402015.pdf?arnumber=10402015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T05:13:18Z","timestamp":1716441198000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10402015\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":266,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/comst.2024.3355168","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}