Hardware Security in Emerging Technologies: Vulnerabilities, Attacks, and Solutions
نویسندگان
چکیده
This Special Issue of the IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS SYSTEMS (JETCAS) is dedicated to demonstrating latest research progress in area hardware security emerging technologies.
منابع مشابه
Hardware and Security: Vulnerabilities and Solutions
This chapter introduces the role that computer hardware plays for attack and defense in cyberphysical systems. Hardware security – whether for attack or defense – differs from software, network, and data security because of the nature of hardware. Often, hardware design and manufacturing occur before or during software development, and as a result, we must consider hardware security early in pr...
متن کاملSCADA Cyber Attacks and Security Vulnerabilities: Review
SCADA plays a vital role in critical infrastructures. As the modern IT technology become very advanced, the threat on industrial control system (ICS) and SCADA security become a big concern of every critical infrastructures operator. With the recent cyber-attacks, the urge to secure the critical infrastructure is a big issue especially for those countries that uses critical infrastructures. In ...
متن کاملSecurity Vulnerabilities and Solutions in Mobile WiMAX
The development of IEEE 802.16 was started by the IEEE in 2001. After that it was revised several times and ended in the final standard IEEE 802.16-2004 which corresponds to revision D and is often called Fixed WiMAX [1]. It defines Wireless Metropolitan Broadband access for stationary and nomadic use. This means end devices can not move between base stations (BS) but they can enter the network...
متن کاملEmerging Security Technologies and Applications
Due to the quick increase in number of mobile, ubiquitous, cloud, network and communication applications and studies, many computer and communication systems, wired or wireless, have been released to service their customers (human users or other systems). However, hackers everywhere around the world may attack these systems for some reasons, e.g., stealing one company’s business secrets for ano...
متن کاملVoIP Security - Attacks and Solutions
Voice over IP (VoIP) technology is being extensively and rapidly deployed. The flexibility and cost efficiency are the key factors luring enterprises to transition to VoIP. Some security problems may surface with the widespread deployment of VoIP. This article presents an overview of VoIP systems and its security issues. First, we briefly describe basic VoIP architecture and its fundamental dif...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Journal on Emerging and Selected Topics in Circuits and Systems
سال: 2021
ISSN: ['2156-3365', '2156-3357']
DOI: https://doi.org/10.1109/jetcas.2021.3084498