scholarly journals Hardware security without secure hardware: How to decrypt with a password and a server

Author(s):  
Olivier Blazy ◽  
Laura Brouilhet ◽  
Celine Chevalier ◽  
Patrick Towa ◽  
Ida Tucker ◽  
...  
2012 ◽  
Vol 488-489 ◽  
pp. 1480-1487
Author(s):  
Jing Li ◽  
Huan Guo Zhang ◽  
Bo Zhao ◽  
Xi Guo ◽  
Fan He

Cloud computing is an important innovation of current computing models. At present, the research on the security of cloud computing is mainly concentrated on PCs and servers. The security of embedded system in cloud environment does not win enough attention. This paper analysis the security threats of it, and proposes a Secure Hardware Model to provide a tamper-resistant and more reliable hardware embedded platform in cloud environment. Our model adds some new components to traditional embedded system, controls the start sequence of platform’s components, verifies the integrity of crucial information for embedded platform and recovers the system if necessary. Our implementation demonstrates the feasibility of Secure Hardware Model, it enhance the secure and reliable boot of embedded system. With the constant development and application of embedded system in cloud computing field, our research will influence cloud computing greatly.


2019 ◽  
Vol 8 (3) ◽  
pp. 42 ◽  
Author(s):  
Simranjeet Sidhu ◽  
Bassam J. Mohd ◽  
Thaier Hayajneh

Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software, network, and cloud security. A deeper understanding of hardware Trojans (HTs) and protection against them is of utmost importance right now as they are the prime threat to the hardware. This paper emphasizes the need for a secure hardware-level foundation for security of these devices, as depending on software security alone is not adequate enough. These devices must be protected against sophisticated attacks, especially if the groundwork for the attacks is already laid in devices during design or manufacturing process, such as with HTs. This paper will discuss the stealthy nature of these HT, highlight HT taxonomy and insertion methods, and provide countermeasures.


2016 ◽  
pp. 22-30
Author(s):  
Oliver Kehret ◽  
Andreas Walz ◽  
Axel Sikora

The Transport Layer Security (TLS) protocol is a well-established standard for securing communication over insecure communication links, offering layer-4 VPN functionality. In the classical Internet TLS is widely used. With the advances of the Internet of Things (IoT) there is an increasing need to secure communication on resource-constrained embedded devices. On these devices, computation of complex cryptographic algorithms is difficult. Additionally, sensor nodes are physically exposed to attackers. Cryptographic acceleration and secure hardware security modules (HSMs) are possible solutions to these challenges. The usage of specialized cryptographic modules for TLS is not a new phenomenon. However, there are still few hardware security modules suitable for the use on microcontrollers in sensor networks. We therefore present an overview of HSM and TLS solutions along with sample implementations and share some recommendations how to combine both.


2012 ◽  
Author(s):  
Youngok Pino ◽  
Garrett S. Rose

2021 ◽  
Vol 54 (4) ◽  
pp. 1-39
Author(s):  
Wei Hu ◽  
Armaiti Ardeshiricham ◽  
Ryan Kastner

Information flow tracking (IFT) is a fundamental computer security technique used to understand how information moves through a computing system. Hardware IFT techniques specifically target security vulnerabilities related to the design, verification, testing, manufacturing, and deployment of hardware circuits. Hardware IFT can detect unintentional design flaws, malicious circuit modifications, timing side channels, access control violations, and other insecure hardware behaviors. This article surveys the area of hardware IFT. We start with a discussion on the basics of IFT, whose foundations were introduced by Denning in the 1970s. Building upon this, we develop a taxonomy for hardware IFT. We use this to classify and differentiate hardware IFT tools and techniques. Finally, we discuss the challenges yet to be resolved. The survey shows that hardware IFT provides a powerful technique for identifying hardware security vulnerabilities, as well as verifying and enforcing hardware security properties.


Author(s):  
Francesco Regazzoni ◽  
Shivam Bhasin ◽  
Amir Ali Pour ◽  
Ihab Alshaer ◽  
Furkan Aydin ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document