Abstract
Cryptographic reasoning has embraced the idea of "provable security", however, as soon as crypto protocols and primitives are implemented in SW/HW, security and trust become relative to the attacker who may also attempt to embed Trojans, malicious firmware, and exploit implementation vulnerabilities and side channels. Cryptographic reasoning has the implicit assumption of idealized trust in HW. A closer look at HW security shows a more fine-grained understanding of adversarial capabilities with a more realistic understanding of what is meant by trust in HW; a closer look also reveals HW security's own implicit security assumptions.
Original language | English |
---|---|
Title of host publication | TrustED 2015 - Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, co-located with CCS 2015 |
Publisher | Association for Computing Machinery, Inc |
Pages | 1-2 |
ISBN (Electronic) | 9781450338288 |
DOIs | |
Publication status | Published - 16 Oct 2015 |
Externally published | Yes |
Event | 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015 - Denver, United States Duration: 16 Oct 2015 → … |
Conference
Conference | 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015 |
---|---|
Country/Territory | United States |
City | Denver |
Period | 16/10/15 → … |