{"title":"通信系统网络安全硬件解决方案综述","authors":"Eriselda Guri Malaj, G. Marinova","doi":"10.1109/TELECOM50385.2020.9299537","DOIUrl":null,"url":null,"abstract":"Nowadays physical attacks against hardware are a real threat. This happens because our private data are transmitted over the Internet and we are exposed to various attacks where our data can be modified, stolen or destroyed. The paper presents an overview of hardware attacks and it describes and classifies existing solutions for hardware security. It determines how hardware can support software and ensure a secure execution on a cyber-system, what are the open questions and the trends in the area.","PeriodicalId":300010,"journal":{"name":"2020 28th National Conference with International Participation (TELECOM)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Review on Hardware Solutions for Cybersecurity of Communication Systems\",\"authors\":\"Eriselda Guri Malaj, G. Marinova\",\"doi\":\"10.1109/TELECOM50385.2020.9299537\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays physical attacks against hardware are a real threat. This happens because our private data are transmitted over the Internet and we are exposed to various attacks where our data can be modified, stolen or destroyed. The paper presents an overview of hardware attacks and it describes and classifies existing solutions for hardware security. It determines how hardware can support software and ensure a secure execution on a cyber-system, what are the open questions and the trends in the area.\",\"PeriodicalId\":300010,\"journal\":{\"name\":\"2020 28th National Conference with International Participation (TELECOM)\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 28th National Conference with International Participation (TELECOM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TELECOM50385.2020.9299537\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 28th National Conference with International Participation (TELECOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TELECOM50385.2020.9299537","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Review on Hardware Solutions for Cybersecurity of Communication Systems
Nowadays physical attacks against hardware are a real threat. This happens because our private data are transmitted over the Internet and we are exposed to various attacks where our data can be modified, stolen or destroyed. The paper presents an overview of hardware attacks and it describes and classifies existing solutions for hardware security. It determines how hardware can support software and ensure a secure execution on a cyber-system, what are the open questions and the trends in the area.