{"title":"Review on Hardware Solutions for Cybersecurity of Communication Systems","authors":"Eriselda Guri Malaj, G. Marinova","doi":"10.1109/TELECOM50385.2020.9299537","DOIUrl":null,"url":null,"abstract":"Nowadays physical attacks against hardware are a real threat. This happens because our private data are transmitted over the Internet and we are exposed to various attacks where our data can be modified, stolen or destroyed. The paper presents an overview of hardware attacks and it describes and classifies existing solutions for hardware security. It determines how hardware can support software and ensure a secure execution on a cyber-system, what are the open questions and the trends in the area.","PeriodicalId":300010,"journal":{"name":"2020 28th National Conference with International Participation (TELECOM)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 28th National Conference with International Participation (TELECOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TELECOM50385.2020.9299537","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Nowadays physical attacks against hardware are a real threat. This happens because our private data are transmitted over the Internet and we are exposed to various attacks where our data can be modified, stolen or destroyed. The paper presents an overview of hardware attacks and it describes and classifies existing solutions for hardware security. It determines how hardware can support software and ensure a secure execution on a cyber-system, what are the open questions and the trends in the area.