2021
DOI: 10.46586/tches.v2021.i3.176-201
|View full text |Cite
|
Sign up to set email alerts
|

Security and Trust in Open Source Security Tokens

Abstract: Using passwords for authentication has been proven vulnerable in countless security incidents. Hardware security tokens effectively prevent most password-related security issues and improve security indisputably. However, we would like to highlight that there are new threats from attackers with physical access which need to be discussed. Supply chain adversaries may manipulate devices on a large scale and install backdoors before they even reach end users. In evil maid scenarios, specific devices may even be a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(15 citation statements)
references
References 3 publications
0
15
0
Order By: Relevance
“…In this work, we present the first in-depth analysis of the so-called flash erase suppression attack vector presented by Schink et al [SWUH21]. We improve and extend this work with an assessment of the potential risks caused by this attack on real-world products by investigating three open research questions:…”
Section: Contributionsmentioning
confidence: 96%
See 3 more Smart Citations
“…In this work, we present the first in-depth analysis of the so-called flash erase suppression attack vector presented by Schink et al [SWUH21]. We improve and extend this work with an assessment of the potential risks caused by this attack on real-world products by investigating three open research questions:…”
Section: Contributionsmentioning
confidence: 96%
“…The attack was carried out with voltage glitching on an 8-bit microcontroller. About 15 years later, Schink et al [SWUH21] present a similar attack, this time on a more recent 32-bit microcontroller and using EMFI. Although a long time has passed since this attack vector was first published, current microcontrollers still seem to be vulnerable.…”
Section: Related Workmentioning
confidence: 98%
See 2 more Smart Citations
“…Fault attacks are active, physical attacks that are commonly used to threaten the security of embedded devices [DM12, TM17, O'F20, ELG20] and secure elements [Hér,VWWM11,SWUH21]. In these attacks, a fault is induced into the chip causing several effects at the physical level, e.g., transient voltage and current changes as well as timing violations [RBSG21].…”
Section: Fault Attacksmentioning
confidence: 99%