{"title":"硬件安全的挑战和方法","authors":"K. F. Li, Narges Attarmoghaddam","doi":"10.1109/AINA.2018.00136","DOIUrl":null,"url":null,"abstract":"An attack on hardware typically results in a severer and difficult-to-recover damage, hence, it is our interest to focus this work on hardware security. A brief survey of security issues found in various application domains is presented, based on a collection of over seventy papers in IEEE Xplore archived since 2011. Challenges and potential solutions to different kinds of hardware attacks and threats are discussed. Finally, specific hardware security challenges are connected and mapped to each application domain.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Challenges and Methodologies of Hardware Security\",\"authors\":\"K. F. Li, Narges Attarmoghaddam\",\"doi\":\"10.1109/AINA.2018.00136\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An attack on hardware typically results in a severer and difficult-to-recover damage, hence, it is our interest to focus this work on hardware security. A brief survey of security issues found in various application domains is presented, based on a collection of over seventy papers in IEEE Xplore archived since 2011. Challenges and potential solutions to different kinds of hardware attacks and threats are discussed. Finally, specific hardware security challenges are connected and mapped to each application domain.\",\"PeriodicalId\":239730,\"journal\":{\"name\":\"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)\",\"volume\":\"93 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AINA.2018.00136\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINA.2018.00136","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An attack on hardware typically results in a severer and difficult-to-recover damage, hence, it is our interest to focus this work on hardware security. A brief survey of security issues found in various application domains is presented, based on a collection of over seventy papers in IEEE Xplore archived since 2011. Challenges and potential solutions to different kinds of hardware attacks and threats are discussed. Finally, specific hardware security challenges are connected and mapped to each application domain.