Physical Inspection & Attacks: New Frontier in Hardware Security.
M. Tanjidur RahmanQihang ShiShahin TajikHao-Ting ShenDamon L. WoodardMark M. TehranipoorNavid AsadizanjaniPublished in: IVSW (2018)
Keyphrases
- security threats
- security mechanisms
- security problems
- security breaches
- security protocols
- computer security
- java card
- cyber attacks
- security measures
- security risks
- security vulnerabilities
- countermeasures
- security issues
- stream cipher
- information security
- protection schemes
- cryptographic protocols
- advanced encryption standard
- security requirements
- denial of service attacks
- fault injection
- security flaws
- malicious users
- low cost
- access control
- malicious attacks
- secure routing
- chosen plaintext
- intrusion detection
- smart card
- network security
- computer systems
- identity theft
- random number generator
- buffer overflow
- trusted computing
- real time
- resource constrained
- cyber security
- information leakage
- intrusion detection system
- biometric template
- cryptographic algorithms
- insider attacks
- unauthorized access
- attack detection
- hardware implementation
- security management
- intrusion prevention
- intrusion detection and prevention
- malicious nodes
- attack scenarios
- authentication scheme
- dos attacks
- defense mechanisms
- security analysis
- biometric systems
- security policies
- wireless sensor networks