Hardware Attacks and Security Education.
Dan Chia-Tien LoKai QianWei ChenPublished in: COMPSAC Workshops (2016)
Keyphrases
- security threats
- security problems
- security mechanisms
- security breaches
- computer security
- java card
- security measures
- cyber attacks
- security protocols
- fault injection
- security issues
- protection schemes
- advanced encryption standard
- security vulnerabilities
- security risks
- countermeasures
- malicious users
- information security
- real time
- stream cipher
- computer systems
- malicious attacks
- network security
- denial of service attacks
- smart card
- security requirements
- information and communication technologies
- cryptographic protocols
- access control
- security flaws
- intrusion detection
- secure routing
- low cost
- security policies
- trusted computing
- random number generator
- chosen plaintext
- hardware implementation
- information leakage
- cyber security
- biometric template
- buffer overflow
- intrusion prevention
- dos attacks
- identity theft
- authentication protocol
- key management
- watermarking scheme
- higher education
- operating system
- protection scheme
- security analysis
- hong kong
- virtual machine
- embedded systems
- defense mechanisms
- e learning