Tamper resistance mechanisms for secure embedded systems

被引:88
|
作者
Ravi, S [1 ]
Raghunathan, A [1 ]
Chakradhar, S [1 ]
机构
[1] NEC Labs Amer, Princeton, NJ 08540 USA
关键词
D O I
10.1109/ICVD.2004.1260985
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security is a concern in the design of a wide range of embedded systems. Extensive research has been devoted to the development of cryptographic algorithms that provide the theoretical underpinnings of information security. Functional security mechanisms, such as security protocols, suitably employ these mathematical primitives in order to achieve the desired security objectives. However, functional security mechanisms alone cannot ensure security, since most embedded systems present attackers with an abundance of opportunities to observe or interfere with their implementation, and hence to compromise their theoretical strength. This paper surveys various tamper or attack techniques, and explains how they can be used to undermine or weaken security functions in embedded systems. Tamper-resistant design refers to the process of designing a system architecture and implementation that is resistant to such attacks. We outline approaches that have been proposed to design tamper-resistant embedded systems, with examples drawn from recent commercial products.
引用
收藏
页码:605 / 611
页数:7
相关论文
共 50 条
  • [41] Secure Key Management in Embedded Systems: A First Proposal
    Jank, Gorazd
    Schmidt, Silvia
    Koschuch, Manuel
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS), 2021, : 81 - 91
  • [42] Tamper resistance - A cautionary note
    Anderson, R
    Kuhn, M
    PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, 1996, : 1 - 11
  • [43] A secure image authentication scheme for tamper detection and recovery
    Chen, T-Y
    Hwang, M-S
    Jan, J-K
    IMAGING SCIENCE JOURNAL, 2012, 60 (04): : 219 - 233
  • [44] A secure hierarchical fragile watermarking method with tamper localization
    Zhang, Xianhai
    Yang, Yongtian
    Zhu, Yan
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 69 - +
  • [45] Secure tamper localization in binary document image authentication
    Puhan, NB
    Ho, ATS
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 4, PROCEEDINGS, 2005, 3684 : 263 - 271
  • [46] Secure audit logging with tamper-resistant hardware
    Chong, CN
    Peng, ZH
    Hartel, PH
    SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 73 - 84
  • [47] Towards a secure, tamper-proof grid platform
    Cooper, Andrew
    Martin, Andrew
    SIXTH IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID: SPANNING THE WORLD AND BEYOND, 2006, : 373 - +
  • [48] Managing obsolescence of embedded hardware and software in secure and trusted systems
    Zachary A. Collier
    James H. Lambert
    Frontiers of Engineering Management, 2020, 7 : 172 - 181
  • [49] Hybrid architectures for efficient and secure face authentication in embedded systems
    Aaraj, Najwa
    Ravi, Srivaths
    Raghunathan, Anand
    Jha, Niraj K.
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2007, 15 (03) : 296 - 308
  • [50] TRUSTED UNIX VERSION POINTS WAY TO SECURE EMBEDDED SYSTEMS
    WILLIAMS, T
    COMPUTER DESIGN, 1991, 30 (07): : 43 - 43