Isaacs et al., 2013 - Google Patents
Tamper proof, tamper evident encryption technologyIsaacs et al., 2013
View PDF- Document ID
- 12097733697664156870
- Author
- Isaacs P
- Morris Jr T
- Fisher M
- Cuthbert K
- Publication year
- Publication venue
- Pan Pacific Symposium
External Links
Snippet
Hardly a week goes by where there isn'ta report of cybercrime having occurred. So much so that there is a special branch of the FBI established to address the many forms of Cyber- Crime. While the internet is convenient for many regular on-line activities, for example …
- 238000005516 engineering process 0 title abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Isaacs et al. | Tamper proof, tamper evident encryption technology | |
Weingart | Physical security devices for computer subsystems: A survey of attacks and defenses | |
Guin et al. | Counterfeit integrated circuits: Detection, avoidance, and the challenges ahead | |
Guin et al. | Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain | |
US8797059B2 (en) | Implementing carbon nanotube based sensors for cryptographic applications | |
US8589703B2 (en) | Tamper respondent covering | |
US7065656B2 (en) | Tamper-evident/tamper-resistant electronic components | |
EP1599846B1 (en) | Tamper evident packaging | |
Immler et al. | B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection | |
US10242543B2 (en) | Tamper-respondent assembly with nonlinearity monitoring | |
Goertzel et al. | Integrated circuit security threats and hardware assurance countermeasures | |
KR20170072274A (en) | Tamper resistant module for industrial control system | |
US20080134349A1 (en) | Card slot anti-tamper protection system | |
US8819842B2 (en) | Implementing conductive microcapsule rupture to generate a tamper event for data theft prevention | |
Kae-Nune et al. | Qualification and testing process to implement anti-counterfeiting technologies into IC packages | |
Kean et al. | Verifying the authenticity of chip designs with the DesignTag system | |
US7495554B2 (en) | Clamshell protective encasement | |
US8930717B2 (en) | Secure processing module and method for making the same | |
Johansson | Tamper Protection for Cryptographic Hardware: A survey and analysis of state-of-the-art tamper protection for communication devices handling cryptographic keys | |
Harish et al. | Investigating the security and accessibility of voyage data recorder data using a usb attack | |
Lemke | Embedded security: Physical protection against tampering attacks | |
Garb et al. | Attacks and countermeasures for capacitive puf-based security enclosures | |
Anik et al. | Testing and reliability enhancement of security primitives: Methodology and experimental validation | |
PL241997B1 (en) | Method of verifying the electronic seal | |
Vineetha Harish et al. | Investigating the security and accessibility of voyage data recorder data using a usb attack |