Hardware Security and Privacy: Threats and Opportunities.
Lizy Kurian JohnPublished in: IEEE Micro (2023)
Keyphrases
- security issues
- security measures
- security threats
- security services
- privacy issues
- information security
- security risks
- security mechanisms
- security concerns
- cyber security
- security management
- security problems
- countermeasures
- cyber attacks
- security breaches
- low cost
- security and privacy issues
- personal information
- statistical databases
- computer security
- privacy preserving
- security vulnerabilities
- security properties
- security policies
- personal data
- denial of service attacks
- computer systems
- privacy concerns
- sensitive data
- cloud computing
- preserving privacy
- individual privacy
- key management
- smart grid
- identity theft
- critical infrastructure
- data security
- secure multiparty computation
- privacy protection
- privacy requirements
- security protocols
- protection mechanisms
- rfid systems
- national security
- network security
- sql injection
- privacy enhancing
- protection schemes
- buffer overflow
- random number generator
- trusted computing
- identity management
- privacy preservation
- privacy preserving data mining
- third party
- intrusion detection
- access control