Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences.
Steve H. WeingartPublished in: CHES (2000)
Keyphrases
- security threats
- security mechanisms
- security problems
- java card
- security protocols
- computer security
- security breaches
- denial of service attacks
- security measures
- security vulnerabilities
- cyber attacks
- countermeasures
- security risks
- computer systems
- chosen plaintext
- physical world
- security issues
- network security
- malicious users
- stream cipher
- cryptographic protocols
- malicious attacks
- fault injection
- information security
- anti virus
- biometric template
- physical objects
- insider attacks
- intrusion detection
- secure routing
- security requirements
- access control
- security flaws
- identity theft
- intrusion prevention
- computer networks
- computer screen
- mobile devices
- intrusion detection and prevention
- rfid tags
- buffer overflow
- personal computer
- operating system
- cyber physical systems
- information leakage
- wireless sensor
- dos attacks
- security analysis
- security management
- malicious nodes
- smart card
- attack scenarios
- standard model
- defense mechanisms
- anomaly detection