2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA) 2016
DOI: 10.1109/aina.2016.144
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Covert Attacks and Countermeasures

Abstract: Computing platforms deployed in many critical infrastructures, such as smart grid, financial systems, governmental organizations etc., are subjected to security attacks and potentially devastating consequences. Computing platforms often get attacked 'physically' by an intruder accessing stored information, studying the internal structure of the hardware or injecting a fault. Even if the attackers fail to gain sensitive information stored in hardware, they may be able to disrupt the hardware or deny service lea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 18 publications
(17 reference statements)
0
2
0
Order By: Relevance
“…A hardware attack's main intention is to disrupt the normal working of the hardware or deny services, leading to system security failures [64].…”
Section: Security Threats During Edge Data Analyticsmentioning
confidence: 99%
“…A hardware attack's main intention is to disrupt the normal working of the hardware or deny services, leading to system security failures [64].…”
Section: Security Threats During Edge Data Analyticsmentioning
confidence: 99%
“…LLNs face two main security challenges. The first challenge is node removal or attacks on nodes' hardware [20]. Second, there are a large number of attacks at the network layer that include Denial of Service (DoS) attacks, sinkhole, blackhole, hello flooding, clone ID, local repair, sybil, and selective forwarding attacks [21,28].…”
Section: Attacks On Rplmentioning
confidence: 99%