Improving IC Security Against Trojan Attacks Through Integration of Security Monitors.
Seetharam NarasimhanWen YuehXinmu WangSaibal MukhopadhyaySwarup BhuniaPublished in: IEEE Des. Test Comput. (2012)
Keyphrases
- security threats
- security problems
- computer security
- information security
- security mechanisms
- security measures
- security issues
- cyber attacks
- intrusion detection
- security protocols
- fault injection
- security breaches
- access control
- statistical databases
- java card
- security level
- stream cipher
- countermeasures
- network security
- malicious attacks
- identity theft
- cryptographic protocols
- malicious users
- cryptographic algorithms
- denial of service attacks
- security management
- cyber security
- security requirements
- security risks
- security properties
- national security
- unauthorized access
- security vulnerabilities
- homeland security
- key management
- rfid tags
- buffer overflow
- security policies
- secure routing