Tamper resistance mechanisms for secure embedded systems

被引:88
|
作者
Ravi, S [1 ]
Raghunathan, A [1 ]
Chakradhar, S [1 ]
机构
[1] NEC Labs Amer, Princeton, NJ 08540 USA
关键词
D O I
10.1109/ICVD.2004.1260985
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security is a concern in the design of a wide range of embedded systems. Extensive research has been devoted to the development of cryptographic algorithms that provide the theoretical underpinnings of information security. Functional security mechanisms, such as security protocols, suitably employ these mathematical primitives in order to achieve the desired security objectives. However, functional security mechanisms alone cannot ensure security, since most embedded systems present attackers with an abundance of opportunities to observe or interfere with their implementation, and hence to compromise their theoretical strength. This paper surveys various tamper or attack techniques, and explains how they can be used to undermine or weaken security functions in embedded systems. Tamper-resistant design refers to the process of designing a system architecture and implementation that is resistant to such attacks. We outline approaches that have been proposed to design tamper-resistant embedded systems, with examples drawn from recent commercial products.
引用
收藏
页码:605 / 611
页数:7
相关论文
共 50 条
  • [1] Secure Memory for Embedded Tamper-proof Systems
    Serpanos, Dimitrios
    Stachoulis, Dimitrios
    2019 14TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS 2019), 2019,
  • [2] A Secure and Robust Approach to Software Tamper Resistance
    Ghosh, Sudeep
    Hiser, Jason D.
    Davidson, Jack W.
    INFORMATION HIDING, 2010, 6387 : 33 - 47
  • [3] Secure physical enclosures from covers with tamper-resistance
    Immler V.
    Obermaier J.
    Ng K.K.
    Ke F.X.
    Lee J.Y.
    Lim Y.P.
    Oh W.K.
    Wee K.H.
    Sigl G.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019 (01): : 51 - 96
  • [4] Tamper Resistance Protection Of Logs Based On Forward-Secure
    Wu, Zhiyong
    Bin ZhuGe
    Wang, Weiming
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 8, 2010, : 90 - 94
  • [5] A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control
    Xu, Shengmin
    Ning, Jianting
    Li, Yingjiu
    Zhang, Yinghui
    Xu, Guowen
    Huang, Xinyi
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) : 53 - 67
  • [6] Provably secure data hiding and tamper resistance for a simple loop program
    Bazzi, RA
    Candan, KS
    Badin, R
    Fajri, A
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND DEFENSE AND LAW ENFORCEMENT II, 2003, 5071 : 517 - 527
  • [7] Secure Architecture for Embedded Systems
    Vai, Michael
    Nahill, Ben
    Kramer, Josh
    Geis, Michael
    Utin, Dan
    Whelihan, David
    Khazan, Roger
    2015 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE (HPEC), 2015,
  • [8] <bold>FASE: An Open Run-Time Reconfigurable FPGA Architecture for Tamper-Resistant and Secure Embedded Systems</bold>
    Chaudhuri, Sumanta
    Danger, Jean-Luc
    Guilley, Sylvain
    Hoogvorst, Philippe
    RECONFIG 2006: PROCEEDINGS OF THE 2006 IEEE INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGA'S, 2006, : 47 - +
  • [9] Secure firmware update in embedded systems
    Keleman, Levon
    Matic, Danijel
    Popovic, Miroslav
    Kastelan, Ivan
    2019 IEEE 9TH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE-BERLIN), 2019, : 16 - 19
  • [10] Performance of Secure Boot in Embedded Systems
    Profentzas, Christos
    Gunes, Mirac
    Nikolakopoulos, Yiannis
    Landsiedel, Olaf
    Almgren, Magnus
    2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), 2019, : 198 - 204