ASHES 2018- Workshop on Attacks and Solutions in Hardware Security.
Chip-Hong ChangJorge GuajardoDaniel E. HolcombFrancesco RegazzoniUlrich RührmairPublished in: CCS (2018)
Keyphrases
- protection schemes
- security mechanisms
- security threats
- security problems
- computer security
- information security
- security breaches
- security protocols
- security risks
- security issues
- buffer overflow
- countermeasures
- access control
- cyber attacks
- cryptographic protocols
- java card
- real time
- chosen plaintext
- insider attacks
- random number generator
- low cost
- stream cipher
- security vulnerabilities
- security measures
- malicious attacks
- biometric template
- security management
- malicious users
- denial of service attacks
- privacy protection
- optimal solution
- trusted computing
- information leakage
- academic researchers
- block cipher
- protection scheme
- security requirements
- cryptographic algorithms
- security policies
- network security
- smart card
- security flaws
- intrusion detection and prevention