Insider Attack Model Against HSM-Based Architecture

نویسندگان

چکیده

In this paper, we propose a combinatory attack model for insider attacks against HSM-based security architectures. Our is based on the study of vectors in architecture and conduction all possible those vectors. It shows that these typical architectures are vulnerable to private key theft replacement, as well data theft, alteration, swapping, nullification, deletion. Results show each was successfully conducted an with relative ease. They prove essential need also considers threats.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ID-Based Encryption with Equality Test Against Insider Attack

Testing if two ciphertexts contain the same plaintext is an interesting cryptographic primitive. It is usually referred to as equality test of encrypted data or equality test.

متن کامل

Securing Web Servers against Insider Attack

Too often, “security of Web transactions” reduces to “encryption of the channel”—and neglects to address what happens at the server on the other end. This oversight forces clients to trust the good intentions and competence of the server operator—but gives clients no basis for that trust. Furthermore, despite academic and industrial research in secure coprocessing, many in the computer science ...

متن کامل

Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider

Many conference systems over the Internet require authenticated group key agreement (AGKA) for secure and reliable communication. After Shamir [1] proposed the ID-based cryptosystem in 1984, ID-based AGKA protocols have been actively studied because of the simple public key management. In 2006, Zhou et al. [12] proposed two-round ID-based AGKA protocol which is very efficient in communication a...

متن کامل

Where Can an Insider Attack?

By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to the targeted organisation. While the problem is well recognised in the security community as well as...

متن کامل

Cyber Threats Foresight Against Iran Based on Attack Vector

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3304994