HARDWARE ATTACK MITIGATION TECHNIQUES ANALYSIS
HARDWARE ATTACK
MITIGATION TECHNIQUES ANALYSIS
Samer Moein1
, T. Aaron Gulliver1 , Fayez Gebali1 and Abdulrahman
Alkandari2
1 Electrical and Computer
Engineering, University of Victoria, BC, Canada
2Department of Computer, Public
Authority for Applied Education and Training, Kuwait City, Kuwait
ABSTRACT
The goal of a
hardware attack is to physically access a digital system to obtain secret
information or modify the system behavior. These attacks can be classified as
covert or overt based on the awareness of the attack. Each hardware attack has
capabilities as well as objectives. Some employ hardware trojans, which are
inserted during, manufacture, while others monitor system emissions. Once a
hardware attack has been identified, mitigation techniques should be employed
to protect the system. There are now a wide variety of techniques, which can be
used against hardware attacks. In this paper, a comprehensive survey of
hardware attack mitigation techniques is presented. These techniques are
matched to the hardware attacks and attack criteria they can counter, which
helps security personnel choose appropriate mitigation techniques to protect
their systems against hardware attacks. An example is presented to illustrate
the choice of appropriate countermeasures.
KEYWORDS
Hardware Attack, Hardware Attack
Mitigation, Hardware Security, Covert Attack & Overt Attack
Source URL:
Comments
Post a Comment