EM Side Channels in Hardware Security: Attacks and Defenses.
Jiaji HeXiaolong GuoMark M. TehranipoorApostol VassilevYier JinPublished in: IEEE Des. Test (2022)
Keyphrases
- denial of service attacks
- denial of service
- network security
- dos attacks
- security breaches
- security threats
- security mechanisms
- security problems
- computer security
- security protocols
- java card
- cyber attacks
- security issues
- security risks
- information security
- security vulnerabilities
- security measures
- low cost
- security flaws
- protection schemes
- fault injection
- expectation maximization
- advanced encryption standard
- stream cipher
- smart card
- biometric template
- computer systems
- chosen plaintext
- cryptographic algorithms
- random number generator
- access control
- security policies
- cryptographic protocols
- maximum likelihood
- secure routing
- em algorithm
- malicious attacks
- intrusion detection
- computer networks
- malicious users
- probabilistic model
- buffer overflow
- lightweight
- intrusion detection system
- security requirements
- trusted computing
- key management
- network layer
- identity theft
- intrusion detection and prevention
- information leakage
- protection scheme
- anomaly detection
- resource constrained
- cloud computing
- ddos attacks
- spam filters