Hardware security and its adversaries

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

Cryptographic reasoning has embraced the idea of "provable security", however, as soon as crypto protocols and primitives are implemented in SW/HW, security and trust become relative to the attacker who may also attempt to embed Trojans, malicious firmware, and exploit implementation vulnerabilities and side channels. Cryptographic reasoning has the implicit assumption of idealized trust in HW. A closer look at HW security shows a more fine-grained understanding of adversarial capabilities with a more realistic understanding of what is meant by trust in HW; a closer look also reveals HW security's own implicit security assumptions.
Original languageEnglish
Title of host publicationTrustED 2015 - Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, co-located with CCS 2015
PublisherAssociation for Computing Machinery, Inc
Pages1-2
ISBN (Electronic)9781450338288
DOIs
Publication statusPublished - 16 Oct 2015
Externally publishedYes
Event5th International Workshop on Trustworthy Embedded Devices, TrustED 2015 - Denver, United States
Duration: 16 Oct 2015 → …

Conference

Conference5th International Workshop on Trustworthy Embedded Devices, TrustED 2015
Country/TerritoryUnited States
CityDenver
Period16/10/15 → …

Fingerprint

Dive into the research topics of 'Hardware security and its adversaries'. Together they form a unique fingerprint.

Cite this