On resilience of security-oriented error detecting architectures against power attacks: a theoretical analysis.
Osnat KerenIlia PolianPublished in: CF (2021)
Keyphrases
- theoretical analysis
- security threats
- security mechanisms
- malicious activities
- security problems
- cyber attacks
- java card
- security protocols
- computer security
- security vulnerabilities
- intrusion detection
- security breaches
- security measures
- denial of service attacks
- countermeasures
- security issues
- identity theft
- fault injection
- chosen plaintext
- cryptographic protocols
- network intrusion detection systems
- misuse detection
- information security
- power consumption
- security flaws
- security risks
- malicious users
- network security
- access control
- protection schemes
- stream cipher
- insider attacks
- cryptographic algorithms
- intrusion detection system
- malicious attacks
- detect malicious
- information leakage
- detecting malicious
- cyber security
- security policies
- smart card
- biometric template
- security requirements
- security management
- key management
- secure routing
- cloud computing
- attack scenarios
- unauthorized access
- dos attacks
- resource constrained
- block cipher
- ddos attacks
- anomaly detection