ebook img

Attacker Models for Hardware aka Embedded Security PDF

48 Pages·2017·1.16 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Attacker Models for Hardware aka Embedded Security

Intro to Hardware Security & Smartcards Erik Poll Digital Security Radboud University Nijmegen 1 Overview • What is hardware security? – Applications – Attacker models – Security requirements • Smartcards What is hardware security? hardware as security solution physical attacks on hardware as threat Applications of ‘secure’ hardware solution Hardware as security Payment authentication Authentication (and non-repudiation?) (or just identification?) 5 solution Hardware as security smart meter physical access control HSM voting computer (Hardware Security Module) 6 solution Hardware as security Fngerprint scanner, hard disk encryption, ... Security features of chips in these devices: TPM, ARM TrustZone, Intel SGX, Apple Secure Enclave, ... (aka TEEs) At a more fundamental level, most CPUs have some hardware security features (with privilege levels, eg kernel vs user mode) 7 Exit smart cards? mDL mobile payments (mobile Driving License) Common types of functionality here • Crypto: storing cryptographic keys & executing cryptographic operations • Access control in the device to secure the functionality provided – Eg with a PIN code Incl. functionality to install keys! Easy to overlook, but crucial of course… Crypto solves some problems • ensuring integrity, authenticity, non-repudiation, confidentiality,… but also introduces new problems: – Where to store keys? – How to distribute them? – What hw/sw can we trust to do crypto operations? – How to ensure integrity & confidentiality of the cryptographic key? Here we will need access control again

Description:
• Microprocessor cards (“smart” smartcard) Smartcard Handbook, 2nd edition, 2000 NB these numbers give a rough impression, but are outdated !!!
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.