مشخصات مقاله | |
ترجمه عنوان مقاله | چالش ها و روش های امنیتی سخت افزار |
عنوان انگلیسی مقاله | Challenges and Methodologies of Hardware Security |
انتشار | مقاله سال 2018 |
تعداد صفحات مقاله انگلیسی | 6 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه IEEE |
مقاله بیس | این مقاله بیس نمیباشد |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
شناسه ISSN | 2332-5658 |
مدل مفهومی | ندارد |
پرسشنامه | ندارد |
متغیر | ندارد |
رفرنس | دارد |
رشته های مرتبط | مهندسی کامپیوتر |
گرایش های مرتبط | امنیت اطلاعات، مهندسی سخت افزار |
نوع ارائه مقاله |
کنفرانس |
کنفرانس | سی و دومین کنفرانس بین المللی شبکه های اطلاعاتی پیشرفته و برنامه های کاربردی – 32nd International Conference on Advanced Information Networking and Applications |
دانشگاه | Electrical and Computer Engineering University of Victoria Victoria, Canada |
کلمات کلیدی | امنیت اینترنتی، امنیت سخت افزار، سخت افزار امنیتی، چالش های امنیتی، تهدیدات امنیتی، مکانیسم های امنیتی، تشخیص حمله، جلوگیری از حمله |
کلمات کلیدی انگلیسی | cyber security، hardware security، security hardware، security challenges، security threats، security mechanisms، attack detection، attack prevention |
شناسه دیجیتال – doi |
https://doi.org/10.1109/AINA.2018.00136 |
کد محصول | E12497 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract
Introduction II- Security Issues in Applications III- Security Challenges and Solutions IV- Hardware Security Challenges in Specific Applications V- Conclusions REFERENCES |
بخشی از متن مقاله: |
Abstract An attack on hardware typically results in a severer and difficult-to-recover damage, hence, it is our interest to focus this work on hardware security. A brief survey of security issues found in various application domains is presented, based on a collection of over seventy papers in IEEE Xplore archived since 2011. Challenges and potential solutions to different kinds of hardware attacks and threats are discussed. Finally, specific hardware security challenges are connected and mapped to each application domain. INTRODUCTION Cyber security has become a major research and industry focus since the inception of the Internet. The U.S. government spent 7.5 billion in 2007 on cyber security, and this figure increased almost fourfold to 28 billion in 2017 [63]. According to a UK government survey, almost half of the UK firms were having cyber security problems in 2017 [66]. Since an attack can occur at any one of the layers (e.g., operating system, network, application software) in the cyber world, there are many approaches to combat the various cyber security attacks including malware, ransomware, denial-ofservice, etc. An attack on hardware typically results in a severer and difficult-to-recover damage. For example, Bidmeshki et al. demonstrate that even low-cost hardwarebased attacks could be catastrophic [9]. Hence, we are interested to investigate issues related to hardware security. This work is based on a brief survey of over seventy prominent papers on hardware security published in IEEE Xplore since 2011. We start with examining hardware security issues pertinent to each of the five identified broad application domains in section II. Next, hardware security challenges found in the survey and the corresponding potential solutions are described in section III. By connecting the materials in sections II and III, specific hardware security challenges are mapped onto each application domain in section IV. Finally, discussions and conclusions are presented in section V. |