...
首页> 外文期刊>International journal of electronic security and digital forensics >Hardware-based cyber threats: attack vectors and defence techniques
【24h】

Hardware-based cyber threats: attack vectors and defence techniques

机译:基于硬件的网络威胁:攻击向量和防御技术

获取原文
获取原文并翻译 | 示例
           

摘要

There are certain vulnerabilities associated with computing hardware that attackers can exploit to launch destructive attacks which often go undetected by the existing hardware and software countermeasures. Side channel attacks (SCAs) and Rowhammer attacks (RHAs), the consequences of hardware vulnerabilities, pose significant security and privacy threats to self-contained computing components and their end-users respectively. Such attacks compromise the security of computational environments, even those with advanced protection mechanisms such as virtualisation, sandboxes or robust encryptions. In light of these security threats against modern computing hardware, we perform an analysis overview of the modi operandi of SCAs and RHAs in hardware implementation and techniques that can be used to extract sensitive data such as secret keys. We then propose various countermeasures to safeguard against these attacks.
机译:攻击者可以利用攻击者可以利用现有硬件和软件对策,攻击者可以利用的计算硬件相关联的漏洞。侧信机攻击(SCAS)和Rowhammer攻击(RHAS),硬件漏洞的后果,对自包含的计算组件及其最终用户分别构成了大量安全和隐私威胁。这种攻击损害了计算环境的安全性,甚至具有高级保护机制的安全性,例如虚拟化,沙箱或鲁棒加密。鉴于这些安全威胁对现代计算硬件,我们在硬件实现和技术中执行了SCAS和RHAS的Modi Operandi的分析概述,可用于提取秘密密钥的敏感数据。然后,我们提出了各种对策,以防止这些攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号