ASHES 2017: Workshop on Attacks and Solutions in Hardware Security.
Chip-Hong ChangMarten van DijkFarinaz KoushanfarUlrich RührmairMark M. TehranipoorPublished in: CCS (2017)
Keyphrases
- protection schemes
- security threats
- security problems
- buffer overflow
- security mechanisms
- computer security
- java card
- access control
- security breaches
- security protocols
- security issues
- security measures
- security vulnerabilities
- malicious attacks
- fault injection
- cyber attacks
- real time
- random number generator
- stream cipher
- denial of service attacks
- malicious users
- low cost
- countermeasures
- information security
- security risks
- cryptographic algorithms
- security flaws
- information leakage
- computer systems
- cryptographic protocols
- optimal solution
- intrusion prevention
- network security
- secure routing
- trusted computing
- insider attacks
- biometric template
- protection scheme
- unauthorized access
- critical infrastructure
- security requirements
- chosen plaintext