A New Way to Prevent UKS Attacks Using Hardware Security Chips.
Qianying ZhangZhiping ShiPublished in: Int. J. Netw. Secur. (2017)
Keyphrases
- sql injection
- security mechanisms
- security threats
- security problems
- computer systems
- computer security
- security measures
- security breaches
- security issues
- countermeasures
- security vulnerabilities
- security protocols
- cyber attacks
- java card
- information security
- fault injection
- high end
- protection schemes
- security requirements
- advanced encryption standard
- denial of service attacks
- smart card
- stream cipher
- access control
- security flaws
- malicious users
- intrusion detection
- malicious attacks
- secure routing
- chosen plaintext
- security risks
- cryptographic protocols
- information leakage
- low cost
- operating system
- biometric template
- digital signal processors
- cryptographic algorithms
- integrated circuit
- random number generator
- buffer overflow
- massively parallel
- high speed
- ibm zenterprise
- security policies
- anomaly detection
- trusted computing
- processing elements
- functional units
- virtual machine
- unauthorized access
- sensitive data
- hardware architecture