Jan. 9, 2023, 2:10 a.m. | Sofia Maragkou, Axel Jantsch

cs.CR updates on arXiv.org arxiv.org

Cyber-physical systems (CPS) provide profitable surfaces for hardware attacks
such as hardware Trojans. Hardware Trojans can implement stealthy attacks such
as leaking critical information, taking control of devices or harm humans. In
this article we review information flow tracking (IFT) methods for protecting
CPS against hardware Trojans, and discuss their current limitations. IFT
methods are a promising approach for the detection of hardware Trojans in
complex systems because the detection mechanism does not necessarily rely on
potential Trojan behavior. However, …

article attacks control cps critical current cyber detection devices discuss flow hardware hardware attacks humans information physical protecting review survey systems tracking trojans

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

IT Security Manager

@ Teltonika | Vilnius/Kaunas, VL, LT

Security Officer - Part Time - Harrah's Gulf Coast

@ Caesars Entertainment | Biloxi, MS, United States

DevSecOps Full-stack Developer

@ Peraton | Fort Gordon, GA, United States

Cybersecurity Cooperation Lead

@ Peraton | Stuttgart, AE, United States

Cybersecurity Engineer - Malware & Forensics

@ ManTech | 201DU - Customer Site,Herndon, VA