ASHES 2020: 4th Workshop on Attacks and Solutions in Hardware Security.
Chip-Hong ChangStefan KatzenbeisserUlrich RührmairPatrick SchaumontPublished in: CCS (2020)
Keyphrases
- protection schemes
- security problems
- security threats
- security mechanisms
- security protocols
- security breaches
- cyber attacks
- computer security
- buffer overflow
- access control
- security measures
- security issues
- security vulnerabilities
- fault injection
- denial of service attacks
- java card
- low cost
- random number generator
- malicious users
- malicious attacks
- information security
- security requirements
- secure routing
- network security
- security flaws
- cryptographic protocols
- countermeasures
- cyber security
- security policies
- security risks
- insider attacks
- intrusion detection
- stream cipher
- chosen plaintext
- cryptographic algorithms
- anomaly detection
- security analysis
- privacy protection
- biometric template
- privacy preserving
- intrusion detection system
- smart card
- trusted computing
- real time
- academic researchers
- hardware implementation
- intrusion prevention