硬件安全问题识别的新方法

M. Iavich, R. Bocu, G. Iashvili, S. Gnatyuk
{"title":"硬件安全问题识别的新方法","authors":"M. Iavich, R. Bocu, G. Iashvili, S. Gnatyuk","doi":"10.1109/PICST51311.2020.9467966","DOIUrl":null,"url":null,"abstract":"Hardware security is one of the most important aspects of cyber security today. A lot of systems are based on the hardware components today. Software implementation of different mechanisms is rather strong only on the program layer. At the same time hardware-based part could be a weak point and easy to break. Hackers today are using different hardware-based attacks methods to gain an access to the systems. Side-channel attacks together with software Trojans are widely used today. Information can be leaked from different sources and on different layers of the system. Engineers from global organizations today are working on improving the security of hardware-based systems. Different components are developed to increase the level of security against popular attacks like side-channel ones. Improvements in hardware components will increase the efficiency of the security mechanisms of an entire systems and make them adoptable in a broader range of real-world use case scenarios. IoT devices are another potential target for the attackers. The goal of the paper is to offer the modern recognition system, which can identify the hardware-based vulnerabilities and provide users with corresponding recommendations. The system that is developed in the frame of our research has the ability to check the hardware of concrete classic, industrial, office or IoT devices. Based on the concrete scenario and information, the system will provide corresponding recommendations. The presented recognition system is a web-based application, which is available for free. Another goal of the work is to analyze the weaknesses of hardware-based devices and related software systems and to offer the necessary improvements.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Novel Method of Hardware Security Problems Identification\",\"authors\":\"M. Iavich, R. Bocu, G. Iashvili, S. Gnatyuk\",\"doi\":\"10.1109/PICST51311.2020.9467966\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Hardware security is one of the most important aspects of cyber security today. A lot of systems are based on the hardware components today. Software implementation of different mechanisms is rather strong only on the program layer. At the same time hardware-based part could be a weak point and easy to break. Hackers today are using different hardware-based attacks methods to gain an access to the systems. Side-channel attacks together with software Trojans are widely used today. Information can be leaked from different sources and on different layers of the system. Engineers from global organizations today are working on improving the security of hardware-based systems. Different components are developed to increase the level of security against popular attacks like side-channel ones. Improvements in hardware components will increase the efficiency of the security mechanisms of an entire systems and make them adoptable in a broader range of real-world use case scenarios. IoT devices are another potential target for the attackers. The goal of the paper is to offer the modern recognition system, which can identify the hardware-based vulnerabilities and provide users with corresponding recommendations. The system that is developed in the frame of our research has the ability to check the hardware of concrete classic, industrial, office or IoT devices. Based on the concrete scenario and information, the system will provide corresponding recommendations. The presented recognition system is a web-based application, which is available for free. Another goal of the work is to analyze the weaknesses of hardware-based devices and related software systems and to offer the necessary improvements.\",\"PeriodicalId\":123008,\"journal\":{\"name\":\"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PICST51311.2020.9467966\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PICST51311.2020.9467966","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

硬件安全是当今网络安全最重要的方面之一。现在很多系统都是基于硬件组件的。不同机制的软件实现仅在程序层上相当强大。同时,基于硬件的部分可能是一个弱点,容易打破。今天的黑客正在使用不同的基于硬件的攻击方法来访问系统。如今,侧信道攻击与软件木马一起被广泛使用。信息可以从不同的来源和系统的不同层泄露。来自全球组织的工程师们正在致力于提高基于硬件的系统的安全性。开发了不同的组件来提高安全级别,以抵御诸如侧信道攻击之类的流行攻击。硬件组件的改进将提高整个系统安全机制的效率,并使它们在更广泛的实际用例场景中可被采用。物联网设备是攻击者的另一个潜在目标。本文的目标是提供一个能够识别基于硬件的漏洞并为用户提供相应建议的现代识别系统。在我们的研究框架中开发的系统具有检查具体经典,工业,办公或物联网设备硬件的能力。系统将根据具体的场景和信息,提供相应的建议。所介绍的识别系统是一个基于网络的应用程序,它是免费的。这项工作的另一个目标是分析基于硬件的设备和相关软件系统的弱点,并提供必要的改进。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Novel Method of Hardware Security Problems Identification
Hardware security is one of the most important aspects of cyber security today. A lot of systems are based on the hardware components today. Software implementation of different mechanisms is rather strong only on the program layer. At the same time hardware-based part could be a weak point and easy to break. Hackers today are using different hardware-based attacks methods to gain an access to the systems. Side-channel attacks together with software Trojans are widely used today. Information can be leaked from different sources and on different layers of the system. Engineers from global organizations today are working on improving the security of hardware-based systems. Different components are developed to increase the level of security against popular attacks like side-channel ones. Improvements in hardware components will increase the efficiency of the security mechanisms of an entire systems and make them adoptable in a broader range of real-world use case scenarios. IoT devices are another potential target for the attackers. The goal of the paper is to offer the modern recognition system, which can identify the hardware-based vulnerabilities and provide users with corresponding recommendations. The system that is developed in the frame of our research has the ability to check the hardware of concrete classic, industrial, office or IoT devices. Based on the concrete scenario and information, the system will provide corresponding recommendations. The presented recognition system is a web-based application, which is available for free. Another goal of the work is to analyze the weaknesses of hardware-based devices and related software systems and to offer the necessary improvements.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信