Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses. Weingart, S. H. In Koç, Ç. K. & Paar, C., editors, Cryptographic Hardware and Embedded Systems — CHES 2000, of Lecture Notes in Computer Science, pages 302–317. Springer Berlin Heidelberg, August, 2000.
Paper doi abstract bibtex As the value of data on computing systems increases and operating systems become more secure, physical attacks on computing systems to steal or modify assets become more likely. This technology requires constant review and improvement, just as other competitive technologies need review to stay at the leading edge. This paper describes known physical attacks, ranging from simple attacks that require little skill or resource, to complex attacks that require trained, technical people and considerable resources. Physical security methods to deter or prevent these attacks are presented. The intent is to match protection methods with the attack methods in terms of complexity and cost. In this way cost effective protection can be produced across a wide range of systems and needs. Specific technical mechanisms now in use are shown, as well as mechanisms proposed for future use. Common design problems and solutions are discussed with consideration for manufacturing.
@incollection{weingart_physical_2000,
series = {Lecture {Notes} in {Computer} {Science}},
title = {Physical {Security} {Devices} for {Computer} {Subsystems}: {A} {Survey} of {Attacks} and {Defenses}},
copyright = {©2000 Springer Berlin Heidelberg},
isbn = {978-3-540-41455-1 978-3-540-44499-2},
shorttitle = {Physical {Security} {Devices} for {Computer} {Subsystems}},
url = {http://link.springer.com/chapter/10.1007/3-540-44499-8_24},
abstract = {As the value of data on computing systems increases and operating systems become more secure, physical attacks on computing systems to steal or modify assets become more likely. This technology requires constant review and improvement, just as other competitive technologies need review to stay at the leading edge. This paper describes known physical attacks, ranging from simple attacks that require little skill or resource, to complex attacks that require trained, technical people and considerable resources. Physical security methods to deter or prevent these attacks are presented. The intent is to match protection methods with the attack methods in terms of complexity and cost. In this way cost effective protection can be produced across a wide range of systems and needs. Specific technical mechanisms now in use are shown, as well as mechanisms proposed for future use. Common design problems and solutions are discussed with consideration for manufacturing.},
language = {en},
number = {1965},
urldate = {2016-01-20TZ},
booktitle = {Cryptographic {Hardware} and {Embedded} {Systems} — {CHES} 2000},
publisher = {Springer Berlin Heidelberg},
author = {Weingart, Steve H.},
editor = {Koç, Çetin K. and Paar, Christof},
month = aug,
year = {2000},
doi = {10.1007/3-540-44499-8_24},
pages = {302--317}
}
Downloads: 0
{"_id":"aeRjtuWi9RNWbWjeg","bibbaseid":"weingart-physicalsecuritydevicesforcomputersubsystemsasurveyofattacksanddefenses-2000","authorIDs":[],"author_short":["Weingart, S. H."],"bibdata":{"bibtype":"incollection","type":"incollection","series":"Lecture Notes in Computer Science","title":"Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses","copyright":"©2000 Springer Berlin Heidelberg","isbn":"978-3-540-41455-1 978-3-540-44499-2","shorttitle":"Physical Security Devices for Computer Subsystems","url":"http://link.springer.com/chapter/10.1007/3-540-44499-8_24","abstract":"As the value of data on computing systems increases and operating systems become more secure, physical attacks on computing systems to steal or modify assets become more likely. This technology requires constant review and improvement, just as other competitive technologies need review to stay at the leading edge. This paper describes known physical attacks, ranging from simple attacks that require little skill or resource, to complex attacks that require trained, technical people and considerable resources. Physical security methods to deter or prevent these attacks are presented. The intent is to match protection methods with the attack methods in terms of complexity and cost. In this way cost effective protection can be produced across a wide range of systems and needs. Specific technical mechanisms now in use are shown, as well as mechanisms proposed for future use. Common design problems and solutions are discussed with consideration for manufacturing.","language":"en","number":"1965","urldate":"2016-01-20TZ","booktitle":"Cryptographic Hardware and Embedded Systems — CHES 2000","publisher":"Springer Berlin Heidelberg","author":[{"propositions":[],"lastnames":["Weingart"],"firstnames":["Steve","H."],"suffixes":[]}],"editor":[{"propositions":[],"lastnames":["Koç"],"firstnames":["Çetin","K."],"suffixes":[]},{"propositions":[],"lastnames":["Paar"],"firstnames":["Christof"],"suffixes":[]}],"month":"August","year":"2000","doi":"10.1007/3-540-44499-8_24","pages":"302–317","bibtex":"@incollection{weingart_physical_2000,\n\tseries = {Lecture {Notes} in {Computer} {Science}},\n\ttitle = {Physical {Security} {Devices} for {Computer} {Subsystems}: {A} {Survey} of {Attacks} and {Defenses}},\n\tcopyright = {©2000 Springer Berlin Heidelberg},\n\tisbn = {978-3-540-41455-1 978-3-540-44499-2},\n\tshorttitle = {Physical {Security} {Devices} for {Computer} {Subsystems}},\n\turl = {http://link.springer.com/chapter/10.1007/3-540-44499-8_24},\n\tabstract = {As the value of data on computing systems increases and operating systems become more secure, physical attacks on computing systems to steal or modify assets become more likely. This technology requires constant review and improvement, just as other competitive technologies need review to stay at the leading edge. This paper describes known physical attacks, ranging from simple attacks that require little skill or resource, to complex attacks that require trained, technical people and considerable resources. Physical security methods to deter or prevent these attacks are presented. The intent is to match protection methods with the attack methods in terms of complexity and cost. In this way cost effective protection can be produced across a wide range of systems and needs. Specific technical mechanisms now in use are shown, as well as mechanisms proposed for future use. Common design problems and solutions are discussed with consideration for manufacturing.},\n\tlanguage = {en},\n\tnumber = {1965},\n\turldate = {2016-01-20TZ},\n\tbooktitle = {Cryptographic {Hardware} and {Embedded} {Systems} — {CHES} 2000},\n\tpublisher = {Springer Berlin Heidelberg},\n\tauthor = {Weingart, Steve H.},\n\teditor = {Koç, Çetin K. and Paar, Christof},\n\tmonth = aug,\n\tyear = {2000},\n\tdoi = {10.1007/3-540-44499-8_24},\n\tpages = {302--317}\n}\n\n","author_short":["Weingart, S. H."],"editor_short":["Koç, Ç. K.","Paar, C."],"key":"weingart_physical_2000","id":"weingart_physical_2000","bibbaseid":"weingart-physicalsecuritydevicesforcomputersubsystemsasurveyofattacksanddefenses-2000","role":"author","urls":{"Paper":"http://link.springer.com/chapter/10.1007/3-540-44499-8_24"},"downloads":0},"bibtype":"incollection","biburl":"https://bibbase.org/zotero/ky25","creationDate":"2019-05-11T17:47:04.666Z","downloads":0,"keywords":[],"search_terms":["physical","security","devices","computer","subsystems","survey","attacks","defenses","weingart"],"title":"Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses","year":2000,"dataSources":["XxiQtwZYfozhQmvGR"]}