MaDMAN: Detection of Software Attacks Targeting Hardware Vulnerabilities.
Nikolaos Foivos PolychronouPierre-Henri ThevenonMaxime PuysVincent BeroullePublished in: DSD (2021)
Keyphrases
- security vulnerabilities
- computer systems
- security risks
- countermeasures
- protection schemes
- hardware design
- security flaws
- object detection
- low cost
- computer hardware
- real time
- hardware platforms
- software implementation
- commercial off the shelf
- embedded systems
- security mechanisms
- computing platform
- false alarms
- personal computer
- information security
- detection method
- dedicated hardware
- attack detection
- operating system
- anti virus
- false positives
- hardware and software
- software systems
- source code
- detection algorithm
- hardware software
- computer security
- software development
- security breaches
- information systems
- data corruption
- control software
- software engineering
- access control
- security threats
- security problems
- dos attacks
- high end
- software architecture
- hardware implementation