2021
DOI: 10.1109/tcad.2020.3047976
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of Hardware Security and Trust: Threats, Countermeasures, and Design Tools

Abstract: An overview of hardware security and trust : threats, countermeasures and design tools. IEEE Transactions On Computer-Aided Design of Integrated Circuits and Systems.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
39
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 98 publications
(39 citation statements)
references
References 264 publications
(295 reference statements)
0
39
0
Order By: Relevance
“…Finally, consumer devices are also susceptible to a variety of attacks at the hardware level [82]. These include architectural and system threats (e.g., secure boot attacks, firmware attacks, etc.…”
Section: ) Rq1: Smart Home Device Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, consumer devices are also susceptible to a variety of attacks at the hardware level [82]. These include architectural and system threats (e.g., secure boot attacks, firmware attacks, etc.…”
Section: ) Rq1: Smart Home Device Securitymentioning
confidence: 99%
“…Eavesdropping [64][65] Node capture and replay attacks [66] Sleep deprivation attack [67] DDoS attack [68] Internet pairing default password [70] Configuration and device authentication [71], [85] Legacy authentication mechanism [72] Exposed services [75] Overprivileged configuration Apps [76], [84] Insecure hardware interfaces [73] OTA Updates and upgradeability weakness [75][76] Critical vulnerabilities: side channel, spyware, and backdoor pin code injection [83] Voice spoofing [79] Communal acts like renting, lending, etc. [80] Hardware-level attacks [82] COTS obsolescence risk [81] RQ2: Network Authentication and communication [87], [89] Default password [85][86] Insecure protocols [24], [91] Susceptibility to MITM attack [88][89], [95] Inappropriate use of encryption [94] Protocol attacks [96], [106] Relay attack [97] Sensitive data [100] Prospective attacks [98][99] Social engineering [99] RQ3: Cloud Information disclosure and access control [116][117] Authentication and verification [119], [94] Exploitable services [112]…”
Section: Rq1: Devicementioning
confidence: 99%
“…(CVEs) is just the tip of an iceberg" [2]. Attack scenarios are manifold and, albeit not considered an attack, hardware reverse engineering (RE) has proven its relevance in these [3].…”
Section: Introductionmentioning
confidence: 99%
“….] the database of common vulnerabilities and exposures (CVEs) is just the tip of an iceberg" [2]. Attack scenarios are manifold and, albeit not considered an attack, hardware reverse engineering (RE) has proven its relevance in these [3].…”
Section: Introductionmentioning
confidence: 99%