{"title":"硬件安全问题识别的新方法","authors":"M. Iavich, R. Bocu, G. Iashvili, S. Gnatyuk","doi":"10.1109/PICST51311.2020.9467966","DOIUrl":null,"url":null,"abstract":"Hardware security is one of the most important aspects of cyber security today. A lot of systems are based on the hardware components today. Software implementation of different mechanisms is rather strong only on the program layer. At the same time hardware-based part could be a weak point and easy to break. Hackers today are using different hardware-based attacks methods to gain an access to the systems. Side-channel attacks together with software Trojans are widely used today. Information can be leaked from different sources and on different layers of the system. Engineers from global organizations today are working on improving the security of hardware-based systems. Different components are developed to increase the level of security against popular attacks like side-channel ones. Improvements in hardware components will increase the efficiency of the security mechanisms of an entire systems and make them adoptable in a broader range of real-world use case scenarios. IoT devices are another potential target for the attackers. The goal of the paper is to offer the modern recognition system, which can identify the hardware-based vulnerabilities and provide users with corresponding recommendations. The system that is developed in the frame of our research has the ability to check the hardware of concrete classic, industrial, office or IoT devices. Based on the concrete scenario and information, the system will provide corresponding recommendations. The presented recognition system is a web-based application, which is available for free. Another goal of the work is to analyze the weaknesses of hardware-based devices and related software systems and to offer the necessary improvements.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Novel Method of Hardware Security Problems Identification\",\"authors\":\"M. Iavich, R. Bocu, G. Iashvili, S. Gnatyuk\",\"doi\":\"10.1109/PICST51311.2020.9467966\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Hardware security is one of the most important aspects of cyber security today. A lot of systems are based on the hardware components today. Software implementation of different mechanisms is rather strong only on the program layer. At the same time hardware-based part could be a weak point and easy to break. Hackers today are using different hardware-based attacks methods to gain an access to the systems. Side-channel attacks together with software Trojans are widely used today. Information can be leaked from different sources and on different layers of the system. Engineers from global organizations today are working on improving the security of hardware-based systems. Different components are developed to increase the level of security against popular attacks like side-channel ones. Improvements in hardware components will increase the efficiency of the security mechanisms of an entire systems and make them adoptable in a broader range of real-world use case scenarios. IoT devices are another potential target for the attackers. The goal of the paper is to offer the modern recognition system, which can identify the hardware-based vulnerabilities and provide users with corresponding recommendations. The system that is developed in the frame of our research has the ability to check the hardware of concrete classic, industrial, office or IoT devices. Based on the concrete scenario and information, the system will provide corresponding recommendations. The presented recognition system is a web-based application, which is available for free. Another goal of the work is to analyze the weaknesses of hardware-based devices and related software systems and to offer the necessary improvements.\",\"PeriodicalId\":123008,\"journal\":{\"name\":\"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PICST51311.2020.9467966\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PICST51311.2020.9467966","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Novel Method of Hardware Security Problems Identification
Hardware security is one of the most important aspects of cyber security today. A lot of systems are based on the hardware components today. Software implementation of different mechanisms is rather strong only on the program layer. At the same time hardware-based part could be a weak point and easy to break. Hackers today are using different hardware-based attacks methods to gain an access to the systems. Side-channel attacks together with software Trojans are widely used today. Information can be leaked from different sources and on different layers of the system. Engineers from global organizations today are working on improving the security of hardware-based systems. Different components are developed to increase the level of security against popular attacks like side-channel ones. Improvements in hardware components will increase the efficiency of the security mechanisms of an entire systems and make them adoptable in a broader range of real-world use case scenarios. IoT devices are another potential target for the attackers. The goal of the paper is to offer the modern recognition system, which can identify the hardware-based vulnerabilities and provide users with corresponding recommendations. The system that is developed in the frame of our research has the ability to check the hardware of concrete classic, industrial, office or IoT devices. Based on the concrete scenario and information, the system will provide corresponding recommendations. The presented recognition system is a web-based application, which is available for free. Another goal of the work is to analyze the weaknesses of hardware-based devices and related software systems and to offer the necessary improvements.