earticle

논문검색

Analysis of Covert Hardware Attacks

원문정보

Samer Moein, Fayez Gebali, Issa Traore

피인용수 : 0(자료제공 : 네이버학술정보)

초록

영어

Current embedded system, such as cell phones and smart-cards, in corporate security devices or cryptographic processor. These cryptographic devices often store private keys or other sensitive data, so compromise of this data or the underlying hardware may lead to loss of privacy, forged access, or monetary theft. Even if the attackers fail to gain the secret information that is stored in a hardware, they may be able to disrupt the hardware or deny service leading to other kinds of security failures in the system. Therefore hardware attacks targets this security devices. Hardware attacks could be covert or overt based on awareness of the targeted system. This paper reviews proposed Accessibility/Resources/Time (ART) schema that quantifies hardware attacks. We focus in this paper on presenting covert attacks and quantify the attack using the ART schema.

목차

Abstract
 I. Introduction
 II. ART Schema
 III. Results and Discussion
 IV. Conclusion
 References
 BIOGRAPHIES

저자정보

  • Samer Moein Electrical and Computer Engineering Department University of Victoria Victoria, Canada
  • Fayez Gebali Electrical and Computer Engineering Department University of Victoria Victoria, Canada
  • Issa Traore Electrical and Computer Engineering Department University of Victoria Victoria, Canada

참고문헌

자료제공 : 네이버학술정보

    ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

    0개의 논문이 장바구니에 담겼습니다.