Tamper resistance mechanisms for secure embedded systems

被引:88
|
作者
Ravi, S [1 ]
Raghunathan, A [1 ]
Chakradhar, S [1 ]
机构
[1] NEC Labs Amer, Princeton, NJ 08540 USA
关键词
D O I
10.1109/ICVD.2004.1260985
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security is a concern in the design of a wide range of embedded systems. Extensive research has been devoted to the development of cryptographic algorithms that provide the theoretical underpinnings of information security. Functional security mechanisms, such as security protocols, suitably employ these mathematical primitives in order to achieve the desired security objectives. However, functional security mechanisms alone cannot ensure security, since most embedded systems present attackers with an abundance of opportunities to observe or interfere with their implementation, and hence to compromise their theoretical strength. This paper surveys various tamper or attack techniques, and explains how they can be used to undermine or weaken security functions in embedded systems. Tamper-resistant design refers to the process of designing a system architecture and implementation that is resistant to such attacks. We outline approaches that have been proposed to design tamper-resistant embedded systems, with examples drawn from recent commercial products.
引用
收藏
页码:605 / 611
页数:7
相关论文
共 50 条
  • [31] Towards scalable and secure execution platform for embedded systems
    Sakai, Junji
    Inoue, Hiroaki
    Edahiro, Masato
    PROCEEDINGS OF THE ASP-DAC 2007, 2007, : 350 - +
  • [32] Microcoded coprocessor for embedded secure biometric authentication systems
    Yang, SL
    Schaumont, P
    Verbauwhede, I
    2005 INTERNATIONAL CONFERENCE ON HARDWARE/SOFTWARE CODESIGN AND SYSTEM SYNTHESIS, 2005, : 130 - 135
  • [33] Secure Login for Web-Based Embedded Systems
    Qu, Bo
    COMMUNICATIONS AND INFORMATION PROCESSING, PT 1, 2012, 288 : 640 - 647
  • [34] Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain
    Cao, Sheng
    Zhang, Gexiang
    Liu, Pengfei
    Zhang, Xiaosong
    Neri, Ferrante
    INFORMATION SCIENCES, 2019, 485 : 427 - 440
  • [35] EM alignment using phase for secure embedded systems
    Catherine Gebotys
    Brian A. White
    Design Automation for Embedded Systems, 2008, 12 : 185 - 206
  • [36] Design and implementation of secure embedded systems based on Trustzone
    Xu Yan-ling
    Pan Wei
    Zhang Xin-guo
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2008, : 136 - +
  • [37] EM alignment using phase for secure embedded systems
    Gebotys, Catherine
    White, Brian A.
    DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2008, 12 (03) : 185 - 206
  • [38] Secure embedded intelligence in nuclear systems: Framework and methods
    Garcia, Humberto E.
    Aumeier, Steven E.
    Al-Rashdan, Ahmad Y.
    Rolston, Bri L.
    ANNALS OF NUCLEAR ENERGY, 2020, 140 (140)
  • [39] Practical Principle of Least Privilege for Secure Embedded Systems
    Jero, Samuel
    Furgala, Juliana
    Pan, Runyu
    Gadepalli, Phani Kishore
    Clifford, Alexandra
    Ye, Bite
    Khazan, Roger
    Ward, Bryan C.
    Parmer, Gabriel
    Skowyra, Richard
    2021 IEEE 27TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS 2021), 2021, : 1 - 13
  • [40] Optimization of Secure Embedded Systems with Dynamic Task Sets
    Jiang, Ke
    Eles, Petru
    Peng, Zebo
    DESIGN, AUTOMATION & TEST IN EUROPE, 2013, : 1765 - 1770