روش های امنیتی سخت افزار
ترجمه نشده

روش های امنیتی سخت افزار

عنوان فارسی مقاله: چالش ها و روش های امنیتی سخت افزار
عنوان انگلیسی مقاله: Challenges and Methodologies of Hardware Security
مجله/کنفرانس: سی و دومین کنفرانس بین المللی شبکه های اطلاعاتی پیشرفته و برنامه های کاربردی - ۳۲nd International Conference on Advanced Information Networking and Applications
رشته های تحصیلی مرتبط: مهندسی کامپیوتر
گرایش های تحصیلی مرتبط: امنیت اطلاعات، مهندسی سخت افزار
کلمات کلیدی فارسی: امنیت اینترنتی، امنیت سخت افزار، سخت افزار امنیتی، چالش های امنیتی، تهدیدات امنیتی، مکانیسم های امنیتی، تشخیص حمله، جلوگیری از حمله
کلمات کلیدی انگلیسی: cyber security، hardware security، security hardware، security challenges، security threats، security mechanisms، attack detection، attack prevention
شناسه دیجیتال (DOI): https://doi.org/10.1109/AINA.2018.00136
دانشگاه: Electrical and Computer Engineering University of Victoria Victoria, Canada
صفحات مقاله انگلیسی: 6
ناشر: آی تریپل ای - IEEE
نوع ارائه مقاله: کنفرانس
نوع مقاله: ISI
سال انتشار مقاله: 2018
شناسه ISSN: 2332-5658
فرمت مقاله انگلیسی: PDF
وضعیت ترجمه: ترجمه نشده است
قیمت مقاله انگلیسی: رایگان
آیا این مقاله بیس است: خیر
آیا این مقاله مدل مفهومی دارد: ندارد
آیا این مقاله پرسشنامه دارد: ندارد
آیا این مقاله متغیر دارد: ندارد
کد محصول: E12497
رفرنس: دارای رفرنس در داخل متن و انتهای مقاله
فهرست مطالب (انگلیسی)

Abstract

Introduction

II- Security Issues in Applications

III- Security Challenges and Solutions

IV- Hardware Security Challenges in Specific Applications

V- Conclusions

REFERENCES

بخشی از مقاله (انگلیسی)

Abstract

An attack on hardware typically results in a severer and difficult-to-recover damage, hence, it is our interest to focus this work on hardware security. A brief survey of security issues found in various application domains is presented, based on a collection of over seventy papers in IEEE Xplore archived since 2011. Challenges and potential solutions to different kinds of hardware attacks and threats are discussed. Finally, specific hardware security challenges are connected and mapped to each application domain.

INTRODUCTION

Cyber security has become a major research and industry focus since the inception of the Internet. The U.S. government spent 7.5 billion in 2007 on cyber security, and this figure increased almost fourfold to 28 billion in 2017 [63]. According to a UK government survey, almost half of the UK firms were having cyber security problems in 2017 [66]. Since an attack can occur at any one of the layers (e.g., operating system, network, application software) in the cyber world, there are many approaches to combat the various cyber security attacks including malware, ransomware, denial-ofservice, etc. An attack on hardware typically results in a severer and difficult-to-recover damage. For example, Bidmeshki et al. demonstrate that even low-cost hardwarebased attacks could be catastrophic [9]. Hence, we are interested to investigate issues related to hardware security. This work is based on a brief survey of over seventy prominent papers on hardware security published in IEEE Xplore since 2011. We start with examining hardware security issues pertinent to each of the five identified broad application domains in section II. Next, hardware security challenges found in the survey and the corresponding potential solutions are described in section III. By connecting the materials in sections II and III, specific hardware security challenges are mapped onto each application domain in section IV. Finally, discussions and conclusions are presented in section V.