[go: up one dir, main page]

Isaacs et al., 2013 - Google Patents

Tamper proof, tamper evident encryption technology

Isaacs et al., 2013

View PDF
Document ID
12097733697664156870
Author
Isaacs P
Morris Jr T
Fisher M
Cuthbert K
Publication year
Publication venue
Pan Pacific Symposium

External Links

Snippet

Hardly a week goes by where there isn'ta report of cybercrime having occurred. So much so that there is a special branch of the FBI established to address the many forms of Cyber- Crime. While the internet is convenient for many regular on-line activities, for example …
Continue reading at rick.eng.br (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Similar Documents

Publication Publication Date Title
Isaacs et al. Tamper proof, tamper evident encryption technology
Weingart Physical security devices for computer subsystems: A survey of attacks and defenses
Guin et al. Counterfeit integrated circuits: Detection, avoidance, and the challenges ahead
Guin et al. Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain
US8797059B2 (en) Implementing carbon nanotube based sensors for cryptographic applications
US8589703B2 (en) Tamper respondent covering
US7065656B2 (en) Tamper-evident/tamper-resistant electronic components
EP1599846B1 (en) Tamper evident packaging
Immler et al. B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection
US10242543B2 (en) Tamper-respondent assembly with nonlinearity monitoring
Goertzel et al. Integrated circuit security threats and hardware assurance countermeasures
KR20170072274A (en) Tamper resistant module for industrial control system
US20080134349A1 (en) Card slot anti-tamper protection system
US8819842B2 (en) Implementing conductive microcapsule rupture to generate a tamper event for data theft prevention
Kae-Nune et al. Qualification and testing process to implement anti-counterfeiting technologies into IC packages
Kean et al. Verifying the authenticity of chip designs with the DesignTag system
US7495554B2 (en) Clamshell protective encasement
US8930717B2 (en) Secure processing module and method for making the same
Johansson Tamper Protection for Cryptographic Hardware: A survey and analysis of state-of-the-art tamper protection for communication devices handling cryptographic keys
Harish et al. Investigating the security and accessibility of voyage data recorder data using a usb attack
Lemke Embedded security: Physical protection against tampering attacks
Garb et al. Attacks and countermeasures for capacitive puf-based security enclosures
Anik et al. Testing and reliability enhancement of security primitives: Methodology and experimental validation
PL241997B1 (en) Method of verifying the electronic seal
Vineetha Harish et al. Investigating the security and accessibility of voyage data recorder data using a usb attack