Security of emerging non-volatile memories: Attacks and defenses.
Kaveh ShamsiYier JinPublished in: VTS (2016)
Keyphrases
- denial of service attacks
- denial of service
- dos attacks
- network security
- security threats
- security vulnerabilities
- security breaches
- security mechanisms
- security protocols
- computer security
- information security
- cyber attacks
- security measures
- countermeasures
- security problems
- java card
- security risks
- chosen plaintext
- security issues
- fault injection
- stream cipher
- intrusion detection system
- malicious attacks
- security flaws
- access control
- intrusion detection
- cryptographic protocols
- security requirements
- security management
- network layer
- file system
- security policies
- secure routing
- malicious users
- intrusion prevention
- insider attacks
- cryptographic algorithms
- unauthorized access
- information leakage
- smart card
- associative memory
- data storage
- resource constrained
- biometric template
- key management
- lightweight
- sql injection