Login / Signup

A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection Mechanisms.

Nikolaos Foivos PolychronouPierre-Henri ThevenonMaxime PuysVincent Beroulle
Published in: ACM Trans. Design Autom. Electr. Syst. (2022)
Keyphrases