Where Do All My Keys Come From?

Advances in Systems Analysis, Software Engineering, and High Performance ComputingSolutions for Cyber-Physical Systems Ubiquity(2018)

引用 0|浏览11
暂无评分
摘要
Nowadays, cyber-physical systems are omnipresent in our daily lives and are increasingly used to process confidential data. While the variety of portable devices we use excessively at home and at work is steadily increasing, their security vulnerabilities are often not noticed by the user. Therefore, portable devices such as wearables are becoming more and more interesting for adversaries. Thus, a robust and secure software design is required for the implementation of cryptographic communication protocols and encryption algorithms. While these topics are well discussed and subject to further research activities, the issue of provisioning the initial device setup is widely uncovered. However, the protection of the initial setup is as important as the protection of the confidential data during the time in use. In this work, the authors will present solutions for a secure initialization of security critical integrated circuits (ICs).
更多
查看译文
关键词
keys
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要