2011 IEEE International Symposium on Hardware-Oriented Security and Trust 2011
DOI: 10.1109/hst.2011.5954987
|View full text |Cite
|
Sign up to set email alerts
|

TinyTPM: A lightweight module aimed to IP protection and trusted embedded platforms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 16 publications
0
10
0
Order By: Relevance
“…Thus, attacking the Dynamic Context Manager will not yield any useful information to the attacker. Additionally, the approaches in [14], [15] provide means to protect both static and dynamic regions of the FPGA, which contain both the Dynamic Context Manager and the Trust Compartments. Thus, the proposed architecture complies to the security standards as required by the TCG.…”
Section: B Security Assumptionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, attacking the Dynamic Context Manager will not yield any useful information to the attacker. Additionally, the approaches in [14], [15] provide means to protect both static and dynamic regions of the FPGA, which contain both the Dynamic Context Manager and the Trust Compartments. Thus, the proposed architecture complies to the security standards as required by the TCG.…”
Section: B Security Assumptionsmentioning
confidence: 99%
“…To protect the partial bitstreams representing different Trust Compartments they are stored inside a secure memory location. Such a memory can be provided by known approaches, e.g., [14], [15]. Before loading these bitstreams into the allocated region they are checked for their integrity using one of the aforementioned approaches, as these approaches cover the Dolev-Yao [16] assumptions.…”
Section: B Security Assumptionsmentioning
confidence: 99%
“…The cryptographic hardware engineering field includes a wide range of works: side-channel countermeasure design [Popp et al 2007], efficient hardware implementation of new cryptographic algorithms such as homomorphic encryption [Gentry and Halevi 2011;Naehrig et al 2011], lightweight device security (such as RIFD, smart cards) [Rolfes et al 2008;Lin et al 2010;Feller et al 2011], TRNG (True Random Number Generator) design and characterization [Valtchanov et al 2010], chip identification circuits in new CMOS technologies, passive and active IC metering [Maes et al 2009;Baumgarten et al 2010], etc.…”
Section: Secure By Designmentioning
confidence: 99%
“…Simpson and Schaumont describe an off-line authentication scheme for embedded software IP modules in FPGAs [16]. Besides this software-oriented approach, a number of hardware solutions were proposed [5][6][7]9]. In [6], a proof-of-concept implementation is presented to reconfigure the majority of the FPGA such that it has a design, containing a specific IP core.…”
Section: Introduction and Previous Workmentioning
confidence: 99%
“…Besides this software-oriented approach, a number of hardware solutions were proposed [5][6][7]9]. In [6], a proof-of-concept implementation is presented to reconfigure the majority of the FPGA such that it has a design, containing a specific IP core. However, this does not provide a flexible way of obtaining and implementing one or more IP cores.…”
Section: Introduction and Previous Workmentioning
confidence: 99%