Hardware Security in Emerging Technologies: Vulnerabilities, Attacks, and Solutions

نویسندگان

چکیده

This Special Issue of the IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS SYSTEMS (JETCAS) is dedicated to demonstrating latest research progress in area hardware security emerging technologies.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardware and Security: Vulnerabilities and Solutions

This chapter introduces the role that computer hardware plays for attack and defense in cyberphysical systems. Hardware security – whether for attack or defense – differs from software, network, and data security because of the nature of hardware. Often, hardware design and manufacturing occur before or during software development, and as a result, we must consider hardware security early in pr...

متن کامل

SCADA Cyber Attacks and Security Vulnerabilities: Review

SCADA plays a vital role in critical infrastructures. As the modern IT technology become very advanced, the threat on industrial control system (ICS) and SCADA security become a big concern of every critical infrastructures operator. With the recent cyber-attacks, the urge to secure the critical infrastructure is a big issue especially for those countries that uses critical infrastructures. In ...

متن کامل

Security Vulnerabilities and Solutions in Mobile WiMAX

The development of IEEE 802.16 was started by the IEEE in 2001. After that it was revised several times and ended in the final standard IEEE 802.16-2004 which corresponds to revision D and is often called Fixed WiMAX [1]. It defines Wireless Metropolitan Broadband access for stationary and nomadic use. This means end devices can not move between base stations (BS) but they can enter the network...

متن کامل

Emerging Security Technologies and Applications

Due to the quick increase in number of mobile, ubiquitous, cloud, network and communication applications and studies, many computer and communication systems, wired or wireless, have been released to service their customers (human users or other systems). However, hackers everywhere around the world may attack these systems for some reasons, e.g., stealing one company’s business secrets for ano...

متن کامل

VoIP Security - Attacks and Solutions

Voice over IP (VoIP) technology is being extensively and rapidly deployed. The flexibility and cost efficiency are the key factors luring enterprises to transition to VoIP. Some security problems may surface with the widespread deployment of VoIP. This article presents an overview of VoIP systems and its security issues. First, we briefly describe basic VoIP architecture and its fundamental dif...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Journal on Emerging and Selected Topics in Circuits and Systems

سال: 2021

ISSN: ['2156-3365', '2156-3357']

DOI: https://doi.org/10.1109/jetcas.2021.3084498