<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>ijesm</PublisherName>
      <JournalTitle>International Journal of Engineering, Science and</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>volume 13,issue 3,</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Multidisciplinary</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>March 2024</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>-0001</Year>
        <Month>11</Month>
        <Day>30</Day>
      </PubDate>
      <ArticleType>Engineering, Science and Mathematics</ArticleType>
      <ArticleTitle>Stealthy Threats: The Underestimated Risk of Side-Channel Attacks in Hardware</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>20</FirstPage>
      <LastPage>23</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Abhilasha Kalkunte</FirstName>
          <LastName>Ramaswamy</LastName>
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
        </Author>
      </AuthorList>
      <DOI/>
      <Abstract>This article, drawing upon the author__ampersandsign#39;s expertise in hardware security within industries such as robotics, autonomous vehicles, and fintech, this article delves into the pervasive threat posed by side-channel attacks on hardware systems. It explores the broader relevance of hardware security practices across all sectors and provides actionable insights into securing hardware against such attacks by the way of case studies of relevant incidents.&#13;
&#13;
Additionally, it underscores the potential consequences of neglecting hardware security, underscoring the necessity of proactive implementation to mitigate the risk of side-channel attacks and protect against emerging threats in diverse industrial landscapes.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords/>
      <URLs>
        <Abstract>https://ijesm.co.in/ubijournal-v1copy/journals/abstract.php?article_id=15088&amp;title=Stealthy Threats: The Underestimated Risk of Side-Channel Attacks in Hardware</Abstract>
      </URLs>
      <References>
        <ReferencesarticleTitle>References</ReferencesarticleTitle>
        <ReferencesfirstPage>16</ReferencesfirstPage>
        <ReferenceslastPage>19</ReferenceslastPage>
        <References/>
      </References>
    </Journal>
  </Article>
</ArticleSet>