Hardware Devices Security, their Vulnerabilities and Solutions

被引:0
|
作者
Qayyum, Sundus [1 ]
Ashraf, Sajjad [1 ]
Shafique, Muzammal [1 ]
Waheed, Salman [1 ]
机构
[1] CESAT, Islamabad, Pakistan
来源
PROCEEDINGS OF 2018 15TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST) | 2018年
关键词
Hardware Trojan; HT Insertion; HT Detection; HT Prevention;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Similar to software viruses, hardware devices (ICs, PCBs, FPGAs etc) can also be exploited by the introduction of malicious logic into circuits. This job can be done by adding any malicious logic inside the circuit or by changing the logic in such a manner that will remain undetectable during the testing and verification process. Therefore, it is necessary for the device user to ensure that device being used is trustable. Any Hardware device, especially integrated circuits (ICs), was initially believed to be secure as compare to software products. This vulnerability in hardware devices becomes one of the most important research topic in recent times. This paper will present the review of current research about vulnerabilities in hardware devices, insertion of hardware trojans, the detection methods that can help the user to identify the presence of any malicious circuitry and the prevention measures that can be used to avoid hardware attacks.
引用
收藏
页码:439 / 445
页数:7
相关论文
共 50 条
  • [31] Investigating the Security of OpenPLC: Vulnerabilities, Attacks, and Mitigation Solutions
    Alsabbagh, Wael
    Kim, Chaerin
    Langendoerfer, Peter
    IEEE ACCESS, 2024, 12 : 11561 - 11583
  • [32] A review Report on WiMAX Vulnerabilities, Security Threats and their Solutions
    Kumar, Chandan
    Arya, Y. D. S.
    Agarwal, Gaurav
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1963 - 1967
  • [33] A SURVEY OF SECURITY IN ROBOTIC SYSTEMS: VULNERABILITIES, ATTACKS, AND SOLUTIONS
    Archibald, Christopher
    Schwalm, Luke
    Ball, John E.
    INTERNATIONAL JOURNAL OF ROBOTICS & AUTOMATION, 2017, 32 (02): : 151 - 157
  • [34] A Survey Paper on Vulnerabilities in Android OS and Security of Android Devices
    Meshram, P. D.
    Thool, R. C.
    2014 IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN), 2014, : 174 - 178
  • [35] System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats
    Choi, Seul-Ki
    Yang, Chung-Huang
    Kwak, Jin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (02): : 906 - 918
  • [36] HARDWARE SOLUTIONS IMPROVE DATA-SECURITY
    METH, C
    ELECTRONIC DESIGN, 1995, 43 (10) : 53 - &
  • [37] Cyber Physical Sensors System Security: Threats, Vulnerabilities, and Solutions
    Essa, Areej
    Al-Shoura, Tariq
    Al Nabulsi, Ahmad
    Al-Ali, A. R.
    Aloul, Fadi
    2018 2ND INTERNATIONAL CONFERENCE ON SMART GRID AND SMART CITIES (ICSGSC 2018), 2018, : 62 - 67
  • [38] Virtualization vulnerabilities, security issues, and solutions: a critical study and comparison
    Tank D.
    Aggarwal A.
    Chaubey N.
    International Journal of Information Technology, 2022, 14 (2) : 847 - 862
  • [39] Research and Development Priorities for Security of Embedded Hardware Devices
    Moghadasi, Negin
    Luu, Mai
    Adekunle, Rahman O.
    Polmateer, Thomas L.
    Manasco, Mark C.
    Emmert, John M.
    Lambert, James H.
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2024, 71 : 2800 - 2811
  • [40] A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions
    Aslan, Omer
    Aktug, Semih Serkant
    Ozkan-Okay, Merve
    Yilmaz, Abdullah Asim
    Akin, Erdal
    ELECTRONICS, 2023, 12 (06)