Hardware Attack Risk Assessment

被引:0
|
作者
Moein, Samer [1 ]
Gebali, Fayez [1 ]
Gulliver, T. Aaron [1 ]
El-Kharashi, M. Watheq [2 ]
机构
[1] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC V8W 2Y2, Canada
[2] Ain Shams Univ, Comp & Syst Engn Dept, Cairo 11517, Egypt
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Modern VLSI chips have high complexity and usually contain cryptographic processors to protect their data and external communications. Attackers target the hardware to imitate or understand the system design, gain access to the system or obtain encryption keys. They may also want to initiate attacks such as denial of service to disable the services supported by a chip, or reduce system reliability. In this paper, risk levels are defined for hardware attacks based on the accessibility, resources, and time required to successfully attack a system.
引用
收藏
页码:346 / 350
页数:5
相关论文
共 50 条
  • [1] Individual risk assessment for worm attack
    Schnieder, Thomas
    KLEINTIERPRAXIS, 2008, 53 (12): : 797 - 799
  • [2] Cloud Attack and Risk Assessment Taxonomy
    Juliadotter, Nina Viktoria
    Choo, Kim-Kwang Raymond
    IEEE CLOUD COMPUTING, 2015, 2 (01): : 14 - 20
  • [3] Scalable Attack Graph for Risk Assessment
    Lee, Jehyun
    Lee, Heejo
    In, Hoh Peter
    ICOIN: 2009 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, 2009, : 78 - 82
  • [4] CRESS: Framework for Vulnerability Assessment of Attack Scenarios in Hardware Reverse Engineering
    Ludwig, Matthias
    Hepp, Alexander
    Brunner, Michaela
    Baehr, Johanna
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON PHYSICAL ASSURANCE AND INSPECTION ON ELECTRONICS (PAINE), 2021,
  • [5] Hardware Security Risk Assessment: A Case Study
    Sherman, Brent
    Wheeler, David
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 179 - 184
  • [6] Cyber Security Risk Assessment of a DDoS Attack
    Wangen, Gaute
    Shalaginov, Andrii
    Hallstensen, Christoffer
    INFORMATION SECURITY, (ISC 2016), 2016, 9866 : 183 - 202
  • [7] Assessment of asthma attack risk using an online risk checker
    Broadbent, Catherine
    Kennington, Erika
    Walker, Samantha
    EUROPEAN RESPIRATORY JOURNAL, 2017, 50
  • [8] Exploring risk flow attack graph for security risk assessment
    Dai, Fangfang
    Hu, Ying
    Zheng, Kangfeng
    Wu, Bin
    IET INFORMATION SECURITY, 2015, 9 (06) : 344 - 353
  • [9] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [10] Damage risk assessment of breakwaters under tsunami attack
    Ergin, Aysen
    Balas, Can Elmar
    NATURAL HAZARDS, 2006, 39 (02) : 231 - 243