63,767 research outputs found
Trojans in Early Design StepsâAn Emerging Threat
Hardware Trojans inserted by malicious foundries
during integrated circuit manufacturing have received substantial
attention in recent years. In this paper, we focus on a different
type of hardware Trojan threats: attacks in the early steps of
design process. We show that third-party intellectual property
cores and CAD tools constitute realistic attack surfaces and that
even system specification can be targeted by adversaries. We
discuss the devastating damage potential of such attacks, the
applicable countermeasures against them and their deficiencies
Recommended from our members
The THREAT-ARREST Cyber-Security Training Platform
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations. This paper presets a cyber security training platform, called THREAT-ARREST. The various platform modules can analyze an organizationâs system, identify the most critical threats, and tailor a training program to its personnel needs. Then, different training programmes are created based on the trainee types (i.e. administrator, simple operator, etc.), providing several teaching procedures and accomplishing diverse learning goals. One of the main novelties of THREAT-ARREST is the modelling of these programmes along with the runtime monitoring, management, and evaluation operations. The platform is generic. Nevertheless, its applicability in a smart energy case study is detailed
Internal and external threat in relationship with right-wing attitudes
Objective
Previous studies on the relationship between threat and right-wing attitudes have tended to focus on either internal threat, emanating from one's private life, or external threat, originating from society. However, these studies failed to examine whether these types of threats constitute two distinctive dimensions and which of these threats is most closely related to right-wing attitudes.
Method
In order to explore the dimensions underlying threat, a factor analysis on a variety of threat scales was conducted (Study 1; N?=?300). Furthermore, in a meta-analysis (Study 2; total N?=?22,086) and a questionnaire study in a large representative sample (Study 3, N?=?800) the strength of the relationships of internal and external threat with right-wing attitudes were investigated.
Results
The present studies revealed that internal and external threat can be considered as two distinct dimensions underlying threat. Moreover, whereas external threat yielded strong relationships with right-wing attitudes, internal threat only explained a minor part of the variance in these attitudes.
Conclusions
External rather than internal threat underlies the relationship between threat and right-wing attitudes
- âŠ