Tamper resistance mechanisms for secure embedded systems

被引:88
|
作者
Ravi, S [1 ]
Raghunathan, A [1 ]
Chakradhar, S [1 ]
机构
[1] NEC Labs Amer, Princeton, NJ 08540 USA
关键词
D O I
10.1109/ICVD.2004.1260985
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security is a concern in the design of a wide range of embedded systems. Extensive research has been devoted to the development of cryptographic algorithms that provide the theoretical underpinnings of information security. Functional security mechanisms, such as security protocols, suitably employ these mathematical primitives in order to achieve the desired security objectives. However, functional security mechanisms alone cannot ensure security, since most embedded systems present attackers with an abundance of opportunities to observe or interfere with their implementation, and hence to compromise their theoretical strength. This paper surveys various tamper or attack techniques, and explains how they can be used to undermine or weaken security functions in embedded systems. Tamper-resistant design refers to the process of designing a system architecture and implementation that is resistant to such attacks. We outline approaches that have been proposed to design tamper-resistant embedded systems, with examples drawn from recent commercial products.
引用
收藏
页码:605 / 611
页数:7
相关论文
共 50 条
  • [21] Secure embedded systems: the threat of reverse engineering
    McLoughlin, Ian
    PROCEEDINGS OF THE 2008 14TH IEEE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, 2008, : 729 - 736
  • [22] Hardware Support for Secure Processing in Embedded Systems
    Mao, Shufu
    Wolf, Tilman
    IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (06) : 847 - 854
  • [23] Hardware support for secure processing in embedded systems
    Mao, Shufu
    Wolf, Tilman
    2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 483 - +
  • [24] Implementation of Symmetric Cryptography in Embedded Systems for Secure Measurement Systems
    Bilski, Piotr
    Winiecki, Wieslaw
    Adamski, Tomasz
    2011 IEEE INTERNATIONAL INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE (I2MTC), 2011, : 1288 - 1293
  • [25] A secure image watermarking for tamper detection and localization
    Siddharth Bhalerao
    Irshad Ahmad Ansari
    Anil Kumar
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 1057 - 1068
  • [26] A secure image watermarking for tamper detection and localization
    Bhalerao, Siddharth
    Ansari, Irshad Ahmad
    Kumar, Anil
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) : 1057 - 1068
  • [27] EM alignment using phase for secure embedded systems
    Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON N2L 3G1, Canada
    Des Autom Embedded Syst, 1600, 3 (185-206):
  • [28] Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems
    Martin, Paul D.
    Russell, David
    Rubin, Aviel D.
    Checkoway, Stephen
    Ben Salem, Malek
    2018 IEEE/ACM THIRD INTERNATIONAL CONFERENCE ON INTERNET-OF-THINGS DESIGN AND IMPLEMENTATION (IOTDI 2020), 2018, : 105 - 116
  • [29] A Scalable Secure Overlay Framework for Heterogeneous Embedded Systems
    Kraxberger, Stefan
    IEEE LOCAL COMPUTER NETWORK CONFERENCE, 2010, : 236 - 239
  • [30] Secure communication in microcomputer bus systems for embedded devices
    Muehlbach, Sascha
    Wallner, Sebastian
    JOURNAL OF SYSTEMS ARCHITECTURE, 2008, 54 (11) : 1065 - 1076