Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses.
Lauren BiernackiMark GallagherZhixing XuMisiker Tadesse AgaAustin HarrisShijia WeiMohit TiwariBaris KasikciSharad MalikTodd M. AustinPublished in: ACM J. Emerg. Technol. Comput. Syst. (2021)
Keyphrases
- security vulnerabilities
- denial of service
- dos attacks
- security risks
- network security
- denial of service attacks
- security threats
- buffer overflow
- protection schemes
- security breaches
- computer systems
- lightweight
- security mechanisms
- cyber attacks
- computer security
- intrusion detection
- information security
- low cost
- penetration testing
- security problems
- security properties
- hardware design
- hardware platforms
- hardware and software
- hardware software
- embedded systems
- intrusion detection system
- security protocols
- ddos attacks
- security issues
- computer networks
- windows xp
- security policies
- access control
- unauthorized access
- sql injection
- blue gene
- security measures
- network layer
- java card
- countermeasures
- risk assessment
- hardware implementation
- software development
- stream cipher
- fault injection
- data corruption
- cryptographic protocols
- field programmable gate array
- network traffic