Enhancing Security Against Software Attacks with Reprogrammable Hardware.
Todd R. AndelLindsey N. WhitehurstJeffrey Todd McDonaldWaleed Al-AssadiPublished in: ICDIS (2018)
Keyphrases
- protection schemes
- security vulnerabilities
- security risks
- computer systems
- security threats
- computer security
- security protocols
- security breaches
- security mechanisms
- cyber attacks
- hardware design
- access control
- java card
- security problems
- security measures
- hardware software
- windows xp
- denial of service attacks
- software implementation
- privacy protection
- low cost
- stream cipher
- security flaws
- security issues
- fault injection
- embedded systems
- hardware platforms
- blue gene
- dedicated hardware
- secure routing
- chosen plaintext
- software development
- operating system
- information security
- hardware implementation
- hardware and software
- cryptographic protocols
- static analysis
- security requirements
- countermeasures
- network security
- source code
- software architecture
- advanced encryption standard
- buffer overflow
- random number generator
- personal computer
- security policies
- key management
- computing platform
- unauthorized access
- smart card
- intrusion detection
- cloud computing
- intrusion detection and prevention
- malicious users
- cryptographic algorithms
- identity theft
- malicious attacks
- sensitive data
- dos attacks