Physical security devices for computer subsystems: A survey of attacks and defenses

被引:0
|
作者
Weingart, SH [1 ]
机构
[1] IBM Thomas J Watson Res Ctr, Secure Syst & Smart Card Grp, Hawthorne, NY USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As the value of data on computing systems increases and operating systems become more secure, physical attacks on computing systems to steal or modify assets become more likely. This technology requires constant review and improvement, just as other competitive technologies need review to stay at the leading edge. This paper describes known physical attacks, ranging from simple attacks that require little skill or resource, to complex attacks that require trained, technical people and considerable resources, Physical security methods to deter or prevent these attacks are presented. The intent is to match protection methods with the attack methods in terms of complexity and cost. In this way cost effective protection can be produced across a wide range of systems and needs. Specific technical mechanisms now in use are shown, as well as mechanisms proposed for future use. Common design problems and solutions are discussed with consideration for manufacturing.
引用
收藏
页码:302 / 317
页数:16
相关论文
共 50 条
  • [1] A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses
    Chen, Huashan
    Pendleton, Marcus
    Njilla, Laurent
    Xu, Shouhuai
    [J]. ACM COMPUTING SURVEYS, 2020, 53 (03)
  • [2] The state of affairs in BGP security: A survey of attacks and defenses
    Mitseva, Asya
    Panchenko, Andriy
    Engel, Thomas
    [J]. COMPUTER COMMUNICATIONS, 2018, 124 : 45 - 60
  • [3] Vehicle Security: A Survey of Security Issues and Vulnerabilities, Malware Attacks and Defenses
    Abu Elkhail, Abdulrahman
    Refat, Rafi Ud Daula
    Habre, Ricardo
    Hafeez, Azeem
    Bacha, Anys
    Malik, Hafiz
    [J]. IEEE ACCESS, 2021, 9 : 162401 - 162437
  • [4] Advances in Adversarial Attacks and Defenses in Computer Vision: A Survey
    Akhtar, Naveed
    Mian, Ajmal
    Kardan, Navid
    Shah, Mubarak
    [J]. IEEE ACCESS, 2021, 9 : 155161 - 155196
  • [5] Adversarial Attacks and Defenses on Cyber-Physical Systems: A Survey
    Li, Jiao
    Liu, Yang
    Chen, Tao
    Xiao, Zhen
    Li, Zhenjiang
    Wang, Jianping
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) : 5103 - 5115
  • [6] A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization
    Chao, Daichong
    Xu, Dawei
    Gao, Feng
    Zhang, Chuan
    Zhang, Weiting
    Zhu, Liehuang
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (03): : 1775 - 1829
  • [7] A Survey: Spoofing Attacks in Physical Layer Security
    Yilmaz, Mustafa Harun
    Arslan, Huseyin
    [J]. 2015 IEEE 40TH LOCAL COMPUTER NETWORKS CONFERENCE WORKSHOPS (LCN WORKSHOPS), 2015, : 812 - 817
  • [8] The Survey of RFID Attacks and Defenses
    Li, Hong
    Chen, YongHui
    He, ZhangQing
    [J]. 2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [9] Defenses to Membership Inference Attacks: A Survey
    Hu, Li
    Yan, Anli
    Yan, Hongyang
    Li, Jin
    Huang, Teng
    Zhang, Yingying
    Dong, Changyu
    Yang, Chunsheng
    [J]. ACM COMPUTING SURVEYS, 2024, 56 (04)
  • [10] Survey of Attacks and Defenses against SGX
    Zhang, Yahui
    Zhao, Min
    Li, Tingquan
    Han, Huan
    [J]. PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 1492 - 1496