A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection Mechanisms.
Nikolaos Foivos PolychronouPierre-Henri ThevenonMaxime PuysVincent BeroullePublished in: ACM Trans. Design Autom. Electr. Syst. (2022)
Keyphrases
- security mechanisms
- access control
- countermeasures
- security problems
- embedded systems
- low cost
- detection algorithm
- security flaws
- security risks
- smart objects
- security issues
- physical world
- embedded devices
- cloud computing
- high end
- computer systems
- real time
- buffer overflow
- security vulnerabilities
- attack detection
- management system
- computing systems
- operating system
- rfid tags
- protection schemes
- denial of service attacks
- security breaches
- processing capabilities
- personal computer
- defense mechanisms
- mobile applications
- normal traffic
- attack scenarios
- hardware platforms
- watermarking scheme
- anomaly detection
- resource constrained
- heterogeneous systems