官术网_书友最值得收藏!

Physical security attacks

Physical security is a topic frequently overlooked by IoT vendors that are only familiar with designing equipment, appliances, and other tools historically not subject to exploitation. Physical security attacks include those in which the attacker(s) physically penetrate the enclosure of a host, embedded device, or other type of IoT computing platform to gain access to its processor, memory devices, and other sensitive components. Once accessed over an exposed interface (for example, JTAG), the attacker can readily access memory, sensitive key material, passwords, configuration data, and a variety of other sensitive parameters. Many of today's security appliances now include extensive protections against physical security attacks. Various tamper evidence controls, tamper response mechanisms (for example, automatic wiping of memory), and other techniques exist to protect devices from physical penetration. Smart card chips, Hardware Security Modules (HSM), and many other types of cryptographic module employ such protections to protect cryptographic variables—hence, device identity and data—from compromise.

主站蜘蛛池模板: 勐海县| 五家渠市| 静海县| 宜昌市| 九寨沟县| 冕宁县| 天长市| 邳州市| 浙江省| 吴忠市| 黄平县| 威远县| 普安县| 吉木乃县| 东安县| 浦北县| 韶山市| 吉林省| 普格县| 扎兰屯市| 康定县| 尼勒克县| 长丰县| 乐亭县| 察哈| 龙门县| 玉田县| 石狮市| 咸阳市| 阿巴嘎旗| 怀宁县| 金溪县| 松桃| 孟村| 娱乐| 巴彦县| 台州市| 松阳县| 冀州市| 柘荣县| 濮阳市|