Filters








8,954 Hits in 5.1 sec

Low cost attacks on tamper resistant devices [chapter]

Ross Anderson, Markus Kuhn
<span title="">1998</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
There has been considerable recent interest in the level of tamper resistance that can be provided by low cost devices such as smartcards.  ...  Together, they show that building tamper resistant devices, and using them effectively, is much harder than it looks.  ...  Acknowledgements Mike Roe pointed out that the glitch attack on RSA can be done in real time by a Mafia owned point-of-sale terminal; Stefan Lucks the way to linearise DES.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/bfb0028165">doi:10.1007/bfb0028165</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7rxq7uxqzndzlewjv3fw6r4mce">fatcat:7rxq7uxqzndzlewjv3fw6r4mce</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170810232803/http://web.cse.msstate.edu/~ramkumar/tamper2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/da/cd/dacdf9906168f157671821f853eb7b18c4050740.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/bfb0028165"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Combating side-channel attacks using key management

Donggang Liu, Qi Dong
<span title="">2009</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/t3x4vqewrncrfgn2wu7cafsbsq" style="color: black;">2009 IEEE International Symposium on Parallel &amp; Distributed Processing</a> </i> &nbsp;
Tamper-resistant modules are popular for protecting sensitive data such as cryptographic keys in these devices.  ...  This technique forces attackers to launch much more expensive and invasive attacks to tamper embedded devices and also has the potential of defeating unknown semi-invasive side-channel attacks.  ...  Unfortunately, several recent research studies have shown that a number of low-cost attacks, called side-channel attacks, can be quite effective in compromising the security of most tamper-resistant modules  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ipdps.2009.5161248">doi:10.1109/ipdps.2009.5161248</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ipps/LiuD09.html">dblp:conf/ipps/LiuD09</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/q2kblj2vl5etdc7fhq7n6tuq3e">fatcat:q2kblj2vl5etdc7fhq7n6tuq3e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120130212424/http://ranger.uta.edu/~dliu/publications/ssn09.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/09/8e/098ea8721402b1014b8e38cfb5a0eddd372410e8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ipdps.2009.5161248"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses [chapter]

Steve H. Weingart
<span title="">2000</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
As the value of data on computing systems increases and operating systems become more secure, physical attacks on computing systems to steal or modify assets become more likely.  ...  Physical security methods to deter or prevent these attacks are presented. The intent is to match protection methods with the attack methods in terms of complexity and cost.  ...  Unfortunately, at this time there are no available dosage sensors which are small, low cost, low power, and directly readable.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-44499-8_24">doi:10.1007/3-540-44499-8_24</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ipv4ghxbhjcbxfdzv4grilxcgu">fatcat:ipv4ghxbhjcbxfdzv4grilxcgu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20181030081048/https://link.springer.com/content/pdf/10.1007%2F3-540-44499-8_24.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b4/31/b431293b4215e16b93eba48dea36784083e37414.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-44499-8_24"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Tampering in RFID: A Survey on Risks and Defenses

Filippo Gandino, Bartolomeo Montrucchio, Maurizio Rebaudengo
<span title="2009-09-25">2009</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/s3esrazljvacznpncbsypxcxwy" style="color: black;">Journal on spesial topics in mobile networks and applications</a> </i> &nbsp;
This paper provides readers with an exhaustive overview on risks and defenses against data tampering, highlighting RFID weak spots and open issues.  ...  The most important recent studies on privacy and security for RFID-based systems are examined, and the protection given against tampering is evaluated.  ...  However, low cost RFID tags are very simple devices and most of them do not present a microprocessor, so software tampering does not represent a relevant threat.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11036-009-0209-y">doi:10.1007/s11036-009-0209-y</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nkdsf5rwujbejie7dszqbgbu2i">fatcat:nkdsf5rwujbejie7dszqbgbu2i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171109065125/https://core.ac.uk/download/pdf/11412156.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f0/c2/f0c28bfbe3293d12195494f42d520c493eba74e1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11036-009-0209-y"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Secure Authentication Solution for Cloud-based Smart City Surveillance System

Yosra Ben Dhief, Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga
<span title="">2018</span> <i title="SCITEPRESS - Science and Technology Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7bjbs63oxffftcpgw45mwyavke" style="color: black;">Proceedings of the 15th International Joint Conference on e-Business and Telecommunications</a> </i> &nbsp;
makes the smart city applications a prime target for cyber attacks.  ...  In this paper, we propose a secure scheme for cloud-based smart city surveillance system providing a lightweight sensor authentication protocol based on Physical Unclonable Functions and securing the exchanged  ...  ., 2017) and (Wallrabenstein, 2016) focusing on the use of a low-cost solutions to protect sensor devices from tampering.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5220/0006867006680673">doi:10.5220/0006867006680673</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icete/DhiefDRB18.html">dblp:conf/icete/DhiefDRB18</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mgxt262xknbchjbp54bbe3snem">fatcat:mgxt262xknbchjbp54bbe3snem</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190219233454/http://pdfs.semanticscholar.org/208a/b3b4013d6020bc7668cb3539404a2bc5e46d.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/20/8a/208ab3b4013d6020bc7668cb3539404a2bc5e46d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5220/0006867006680673"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A software-based root-of-trust primitive on multicore platforms

Qiang Yan, Jin Han, Yingjiu Li, Robert H. Deng, Tieyan Li
<span title="">2011</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS &#39;11</a> </i> &nbsp;
MT-SRoT is able to ensure untampered execution of a critical security task, such as remote software attestation, on homogeneous shared-memory multicore platforms without the support of tamper-resistant  ...  In this paper, we analyze the challenges of designing softwarebased root-of-trust on multicore platforms and present two practical attacks that utilize the parallel computing capability to break the existing  ...  of tamper-resistant hardware.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1966913.1966957">doi:10.1145/1966913.1966957</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/YanHLDL11.html">dblp:conf/ccs/YanHLDL11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xpbk647hmneavpkajvqhq3plqu">fatcat:xpbk647hmneavpkajvqhq3plqu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20130623134239/http://www.mysmu.edu/phdis2008/qiang.yan.2008/Doc/%5BAsiaCCS11%5D%20A%20Software-Based%20Root-of-Trust%20Primitive%20on%20Multicore%20Platforms.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b1/0d/b10d0ba347179a0a4dfb479e44bec0374d1070d1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1966913.1966957"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation [chapter]

Mohamed Sabt, Mohammed Achemlal, Abdelmadjid Bouabdallah
<span title="">2015</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kss7mrolvja63k4rmix3iynkzi" style="color: black;">IFIP Advances in Information and Communication Technology</a> </i> &nbsp;
The dual-execution-environment approach (dual-EE) is a trusted model that was defined to allow mobile smart devices to guarantee tamper-resistant execution for highly sensitive applications.  ...  The relevance of our framework is examined by applying it on three technologies, each one represents one category in our classification.  ...  It relies on the specialized OS to provide tamper-resistant capabilities. Applications that demand tamper-resistant protection run only on the specialized trustworthy OS.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-18467-8_37">doi:10.1007/978-3-319-18467-8_37</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ptha3ok5ovhrffoec4ghhrrs54">fatcat:ptha3ok5ovhrffoec4ghhrrs54</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170926130318/https://hal.archives-ouvertes.fr/hal-01246353/document" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c8/83/c883269ce62b99907ad59f04664e4a70e1aa0922.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-18467-8_37"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Anti-counterfeit Integrated Circuits using fuse and tamper-resistant time-stamp circuitry

Avinash R. Desai, Dinesh Ganta, Michael S. Hsiao, Leyla Nazhandali, Chao Wang, Simin Hall
<span title="">2013</span> <i title="IEEE"> 2013 IEEE International Conference on Technologies for Homeland Security (HST) </i> &nbsp;
Furthermore, we propose a second layer of tamper resistance to the time-stamp circuit to make it even more difficult to modify.  ...  These techniques are easy to implement and embed into the circuit using todays technologies, while extremely difficult to modify or tamper with by the adversary.  ...  Fuse Methodology At low cost, seals provide a simple way to distinguish used ICs from new ones.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ths.2013.6699051">doi:10.1109/ths.2013.6699051</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bhdrm5byavbsrdmswlkv32lgqq">fatcat:bhdrm5byavbsrdmswlkv32lgqq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160519033452/http://www.faculty.ece.vt.edu:80/chaowang/pubDOC/DesaiGHNWH13.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ed/bd/edbdc1fea7bf0063ab13eb9726dc72829d3c9481.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ths.2013.6699051"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Secure and Private Distribution of Online Video and Some Related Cryptographic Issues [chapter]

Feng Bao, Robert Deng, Peirong Feng, Yan Guo, Hongjun Wu
<span title="">2001</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The paper can be viewed as one that proposes practical solutions to real life problems, as well as one that presents applied cryptography research.  ...  We mainly focus on the study of security and privacy problems related to the system.  ...  Tamper-Resistant Technology In this paper we do not discuss how to build up tamper-resistant hardware devices. There has been research on this technique for many years.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-47719-5_17">doi:10.1007/3-540-47719-5_17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vq33vqwyofgsphw7n2rbkjzyky">fatcat:vq33vqwyofgsphw7n2rbkjzyky</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170705101426/http://www3.ntu.edu.sg/home/wuhj/research/publications/2001_ACISP_PD.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5f/e7/5fe7afdc28229a380cb7915e291cc034627bdc63.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-47719-5_17"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Packet Coding for Strong Anonymity in Ad Hoc Networks

Imad Aad, Claude Castelluccia, Jean-Pierre Huubaux
<span title="">2006</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rexrafrgrvcc3bgr6narmg2ome" style="color: black;">2006 Securecomm and Workshops</a> </i> &nbsp;
They rely basically on multicast or on onion routing to thwart global attackers or local attackers respectively.  ...  In our work we consider two types of network devices: Tamper-resistant and non-tamper-resistant.  ...  Routing headers for non-tamper-resistant devices In a network with vulnerable (non-tamper-resistant) devices, attackers have access to all keys in the compromised nodes, therefore no authentication can  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/seccomw.2006.359571">doi:10.1109/seccomw.2006.359571</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/securecomm/AadCH06.html">dblp:conf/securecomm/AadCH06</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/owies2dypzgibkkprumbuaduhy">fatcat:owies2dypzgibkkprumbuaduhy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20090617034645/http://icapeople.epfl.ch:80/iaad/publ/securecomm-2006.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6a/a5/6aa5a906694e78cc912c142c8cf0a2bba80c2a2b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/seccomw.2006.359571"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks [chapter]

Frank Vater, Steffen Peter, Peter Langendörfer
<span title="">2007</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Such watch dog is required to prevent clock speed manipulations that can support side channel attacks on cryptographic hardware devices.  ...  Thus, our approach is very well suited to improve the security of low cost devices such as wireless sensor nodes.  ...  With the technology presented in this paper we provide a first step towards the realization of partly protected low-cost devices.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-72354-7_20">doi:10.1007/978-3-540-72354-7_20</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/liwikaf3azbk5gpnfw65qr74wm">fatcat:liwikaf3azbk5gpnfw65qr74wm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170810103605/http://www.ics.uci.edu/~steffenp/files/WISTP_vater.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e2/83/e283e2c5ced9e979af9d9e989533f54e71ed2847.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-72354-7_20"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Revisiting Software Protection [chapter]

Paul C. van Oorschot
<span title="">2003</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software diversity, and white-box cryptography.  ...  Anderson and Kuhn [3] provide a number of attacks against tamper resistant (especially low-cost) devices, and make the case that building and using such devices properly is deceptively difficult.  ...  Such issues have resulted in efforts to develop a low-cost, commercial generic trusted hardware platform.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/10958513_1">doi:10.1007/10958513_1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5hjupbqp5bgvxdrt2tlkeprr6i">fatcat:5hjupbqp5bgvxdrt2tlkeprr6i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170705083327/http://profs.sci.univr.it/%7Egiaco/download/Watermarking-Obfuscation/revisiting%20sw%20protection.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/16/86/168664ffffef23aeaa8ac4062400997b7d14111d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/10958513_1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids

Liping Zhang, Shanyu Tang, He Luo, Kim-Kwang Raymond Choo
<span title="2016-03-23">2016</span> <i title="Public Library of Science (PLoS)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/s3gm7274mfe6fcs7e3jterqlri" style="color: black;">PLoS ONE</a> </i> &nbsp;
In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate  ...  However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks.  ...  , and it can be combined with a tamper-resist device to protect the stored information.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1371/journal.pone.0151253">doi:10.1371/journal.pone.0151253</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/27007951">pmid:27007951</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC4805269/">pmcid:PMC4805269</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5q3n5vs2lzgiligdh4lh7bbqie">fatcat:5q3n5vs2lzgiligdh4lh7bbqie</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171011165831/http://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0151253&amp;type=printable" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e5/7a/e57af40aeb01578b431a0f48b0934810d3e8d89a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1371/journal.pone.0151253"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> plos.org </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4805269" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Cryptographic Processors-A Survey

R. Anderson, M. Bond, J. Clulow, S. Skorobogatov
<span title="">2006</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yfvtieuumfamvmjlc255uckdlm" style="color: black;">Proceedings of the IEEE</a> </i> &nbsp;
This paper surveys the range of applications of tamperresistant hardware, and the array of attack and defence mechanisms which have evolved in the tamper-resistance arms race.  ...  Tamper-resistant cryptographic processors are becoming the standard way to enforce data-usage policies.  ...  Another paper, "Low Cost Attacks on Tamper Resistant Devices" [7] , describes the deliberate addition of a dangerous transaction to a security API.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jproc.2005.862423">doi:10.1109/jproc.2005.862423</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/i3ooy4hiojdatkesh3b2lr6fju">fatcat:i3ooy4hiojdatkesh3b2lr6fju</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20060513075550/http://www.cl.cam.ac.uk:80/~mkb23/research/Survey.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/af/fc/affc2f041af785cf2a921665c3862aa963589187.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jproc.2005.862423"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Failures of Tamper-Proofing in PIN Entry Devices

Saar Drimer, Steven J. Murdoch, Ross Anderson
<span title="">2009</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kt7pnevei5bd5ed4soqmccmdte" style="color: black;">IEEE Security and Privacy</a> </i> &nbsp;
Bank customers are forced to rely on PIN entry devices in stores and bank branches to protect account details.  ...  His research interests range from security protocols and APIs through hardware tamper-resistance and critical national infrastructure to security economics and security psychology.  ...  The Ingenico device also passed the APACS PED Common Criteria evaluation, which requires that "the [security function] shall resist physical attacks based on addition of any PIN-tapping device to the PIN  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/msp.2009.187">doi:10.1109/msp.2009.187</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/eh5n6wbvrraj5fyppwlkkshrkq">fatcat:eh5n6wbvrraj5fyppwlkkshrkq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829005235/http://sec.cs.ucl.ac.uk/users/smurdoch/papers/ieeesp09tamper.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ee/bf/eebfa93b248d1ee4a49ac3973499f1922e0bb4b8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/msp.2009.187"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 8,954 results