2000
DOI: 10.1007/3-540-44499-8_24
|View full text |Cite
|
Sign up to set email alerts
|

Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses

Abstract: Abstract.As the value of data on computing systems increases and operating systems become more secure, physical attacks on computing systems to steal or modify assets become more likely. This technology requires constant review and improvement, just as other competitive technologies need review to stay at the leading edge. This paper describes known physical attacks, ranging from simple attacks that require little skill or resource, to complex attacks that require trained, technical people and considerable res… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
65
0

Year Published

2002
2002
2012
2012

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 133 publications
(69 citation statements)
references
References 5 publications
0
65
0
Order By: Relevance
“…In addition, the security measures should be taken upon detection of a problem (Grand, 2004). In the same context, (Weingart, 2000) describes the various mechanisms ranging from the easiest and cheapest to the most difficult and extremely expensive. To conclude, the definition of new methodologies for safety assessment, which takes into account the changing of security nature, could ensure security of our products.…”
Section: Resultsmentioning
confidence: 99%
“…In addition, the security measures should be taken upon detection of a problem (Grand, 2004). In the same context, (Weingart, 2000) describes the various mechanisms ranging from the easiest and cheapest to the most difficult and extremely expensive. To conclude, the definition of new methodologies for safety assessment, which takes into account the changing of security nature, could ensure security of our products.…”
Section: Resultsmentioning
confidence: 99%
“…Even though tag authentication protocols can provide significant improvements to a tag's cloning resistance, there are many ways to conduct a cloning attack even against a protected tag. These attacks include side channel attack that is based on information gained from the physical implementation of a cryptosystem (e.g., [3]), reverse-engineering and cryptanalysis that includes brute force attack but also much more sophisticated techniques (e.g., [4], [6]), and physical attacks where the goal is to read the secret key directly from tag's memory (e.g., [5]). In addition, tag authentication approach is always vulnerable to data theft where the secret encryption schemes of genuine tags are obtained from insiders through means of manipulation and fraud (social engineering) or even through threatening and blackmailing (rubber-hose cryptanalysis).…”
Section: ) Tag Removal and Reapplyingmentioning
confidence: 99%
“…A gets back the internal data stored on the secure coprocessor. This query can be seen as an attack wherein A gets physical access to a secure coprocessor and bypasses the tamper detection mechanism [29]. This query is only available to the adversary when considering the strong-corruption model (see Section 5).…”
Section: Modelmentioning
confidence: 99%
“…-Corrupt s (U ): This query models the attacks in which the adversary gets access to the smart card and gets back the player's LL-key. This query models attacks like differential power analysis or other attacks by which the adversary bypasses the tamper detection mechanisms of the smart card [29].…”
Section: Modelmentioning
confidence: 99%