New trends in hardware subsystems conception for application protection
Keywords:
Hardware Subsystems, Application Protection, VulnerabilitiesAbstract
In the last few years, Internet increase has led to the rise of digital publications and information exchange among people and institutions. Undoubtedly, these elements stand as advantages, though not always advantages prevail. This is the case of published information that allows intruders to exploit application failures and vulnerabilities in order to breach applications integrity and obtain sensible information from them. Nowadays, there are a variety of strategies aiming at protecting applications against such actions. Within this variety, two trends outstand: software based strategies and hardware based strategies. This article attempts to establish a taxonomy of those technological strategies that uses an external hardware device as part of its protection scheme.