Security-oriented Code-based Architectures for Mitigating Fault Attacks.
Batya KarpMael GayOsnat KerenIlia PolianPublished in: DCIS (2018)
Keyphrases
- fault injection
- java card
- security threats
- sql injection
- security problems
- security mechanisms
- security measures
- security vulnerabilities
- static analysis
- computer security
- countermeasures
- fault model
- security protocols
- cyber attacks
- security breaches
- security risks
- security issues
- denial of service attacks
- malicious users
- security flaws
- information security
- smart card
- cryptographic protocols
- identity theft
- stream cipher
- fault diagnosis
- biometric template
- malicious code
- fault detection
- access control
- malicious attacks
- information leakage
- chosen plaintext
- security requirements
- source code
- protection schemes
- cryptographic algorithms
- intrusion detection and prevention
- intrusion prevention
- protection scheme
- secure routing
- network security
- insider attacks
- authentication scheme
- intrusion detection
- computer networks
- buffer overflow
- unauthorized access
- attack scenarios
- risk management
- network management
- secret key
- error detection
- dos attacks
- security management