2017
DOI: 10.5121/ijcis.2017.7102
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Attack Mitigation Techniques Analysis

Abstract: The goal of a hardware attack is to physically access a digital system to obtain secret information or modify the system behavior.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 55 publications
(98 reference statements)
0
3
0
Order By: Relevance
“…This is because such attacks require expensive and complex laboratory equipment and requires the full possession of the target for a significant amount of time (from hours to weeks) [35,36]. This becomes even more expensive especially when devices are equipped with tamper-resistant mechanisms [21,30,33]. We finally assume that the implementation of FADIA and its cryptographic components does not contain any security bugs.…”
Section: Security Modelmentioning
confidence: 99%
“…This is because such attacks require expensive and complex laboratory equipment and requires the full possession of the target for a significant amount of time (from hours to weeks) [35,36]. This becomes even more expensive especially when devices are equipped with tamper-resistant mechanisms [21,30,33]. We finally assume that the implementation of FADIA and its cryptographic components does not contain any security bugs.…”
Section: Security Modelmentioning
confidence: 99%
“…This is a physical security attack in which an attacker can try to modify the device or even remove it from the system. A device can be protected from it by limiting the access to the device by building a secure zone around it [52]. B a r e n g h i et al [53] have mentioned that the physical access to a device can be restricted by keeping the device in a sealed tamper-resistant case so that when an unauthorized entity tries to tamper the device it cannot do so and the act of tampering is detected.…”
Section: Tamperingmentioning
confidence: 99%
“…Hence, it cannot be employed over larger blocks like ROM, EEPROM, etc 16 . Another variation of this technique is glue logic 78 which involves hiding the exact functionality of the chip using customized digital and logic circuitry to make the cloning using reverse engineering attack difficult. For example, data buses can be made hidden.…”
Section: Existing Countermeasuresmentioning
confidence: 99%