DocumentCode :
3031411
Title :
Invited Talk 2
Author :
Tuyls, P.
Author_Institution :
CTO, Intrinsic-ID Ltd., Eindhoven, Netherlands
fYear :
2009
fDate :
20-21 Aug. 2009
Abstract :
Hardware security is essential to the prevention of cloning, theft of service and tampering. Effective hardware security starts with secure key storage. The level of security provided by a key is dependent upon the effort an attacker needs to expend to compromise the key. The sophistication of the tools that are used to carry out such attacks has increased significantly over the years, compromising the protection of traditional key-storage approaches. A radically new approach is needed to counter this increased threat. Rather than trying harder to conceal the key in the hardware, a revolutionary approach has emerged in which the key is simply not stored. This new approach to hardware security relies on the unique electronic "fingerprint" inherent in every semiconductor device and is known as Hardware Intrinsic Security (HIS).
Keywords :
access control; security of data; cloning prevention; electronic fingerprint; hardware intrinsic security; secure key storage; semiconductor device; service theft;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Bio-inspired Learning and Intelligent Systems for Security, 2009. BLISS '09. Symposium on
Conference_Location :
Edinburgh
Print_ISBN :
978-0-7695-3754-2
Type :
conf
DOI :
10.1109/BLISS.2009.8
Filename :
5376773
Link To Document :
بازگشت