Neve et al., 2003 - Google Patents
Memories: A survey of their secure uses in smart cardsNeve et al., 2003
View PDF- Document ID
- 13267620243409678147
- Author
- Neve M
- Peeters E
- Samyde D
- Quisquater J
- Publication year
- Publication venue
- Second IEEE International Security in Storage Workshop
External Links
Snippet
Smart cards are widely known for their tamper resistance, but only contain a small amount of memory. Though very small, this memory often contains highly valuable information (identification data, cryptographic key, etc). This is why it is subject to many attacks, as the …
- 230000015654 memory 0 title abstract description 114
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C16/00—Erasable programmable read-only memories
- G11C16/02—Erasable programmable read-only memories electrically programmable
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C11/00—Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor
- G11C11/21—Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using electric elements
- G11C11/22—Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using electric elements using ferroelectric elements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Joshi et al. | Everything you wanted to know about PUFs | |
Neve et al. | Memories: A survey of their secure uses in smart cards | |
Ghosh | Spintronics and security: Prospects, vulnerabilities, attack models, and preventions | |
Anderson et al. | Tamper resistance-a cautionary note | |
EP2074628B1 (en) | A secure non-volatile memory device and a method of protecting data therein | |
WO2015089300A1 (en) | Gate-level masking | |
Knechtel | Hardware security for and beyond CMOS technology: an overview on fundamentals, applications, and challenges | |
Yu et al. | Hardware functional obfuscation with ferroelectric active interconnects | |
Bi et al. | Enhancing hardware security with emerging transistor technologies | |
Kolhe et al. | LOCK&ROLL: Deep-learning power side-channel attack mitigation using emerging reconfigurable devices and logic locking | |
Guilley et al. | SoCs security: a war against side-channels | |
Xie et al. | A logic resistive memory chip for embedded key storage with physical security | |
Knechtel | Hardware security for and beyond CMOS technology | |
US20050005108A1 (en) | Cryptographically secure transactions with optical cards | |
Duan et al. | Bti aging-based physical cloning attack on sram puf and the countermeasure | |
Kaur et al. | Stratification of hardware attacks: Side channel attacks and fault injection techniques | |
Kareem et al. | Physical unclonable functions based hardware obfuscation techniques: A state of the art | |
RU2280285C2 (en) | Portable data carrier with protection from unsanctioned access, provided due to distortion for messages, and method for protecting confidential data | |
Wang et al. | Hardware trojan attack in embedded memory | |
Tria et al. | Invasive attacks | |
Sigl et al. | Where technology meets security: Key storage and data separation for system-on-chips | |
Cambou | Enhancing secure elements—technology and architecture | |
De et al. | CTCG: Charge-trap based camouflaged gates for reverse engineering prevention | |
Zanero | Smart card content security | |
Handschuh et al. | Securing flash technology |