Towards Hardware-Intrinsic Security

Foundations and Practice

Editors:

ISBN: 978-3-642-14451-6 (Print) 978-3-642-14452-3 (Online)

Table of contents (18 chapters)

  1. Front Matter

    Pages i-xvi

  2. Physically Unclonable Functions (PUFs)

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-37

      Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions

    3. No Access

      Book Chapter

      Pages 39-53

      Hardware Intrinsic Security from Physically Unclonable Functions

    4. No Access

      Book Chapter

      Pages 55-78

      From Statistics to Circuits: Foundations for Future Physical Unclonable Functions

    5. No Access

      Book Chapter

      Pages 79-96

      Strong PUFs: Models, Constructions, and Security Proofs

  3. Hardware-based Cryptography

    1. Front Matter

      Pages 97-97

    2. No Access

      Book Chapter

      Pages 99-134

      Leakage Resilient Cryptography in Practice

    3. No Access

      Book Chapter

      Pages 135-164

      Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions

  4. Hardware Attacks

    1. Front Matter

      Pages 165-165

    2. No Access

      Book Chapter

      Pages 167-187

      Hardware Trojan Horses

    3. No Access

      Book Chapter

      Pages 189-197

      Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown Fixed Messages and Returning No Results

  5. Hardware-based Policy Enforcement

    1. Front Matter

      Pages 199-199

    2. No Access

      Book Chapter

      Pages 201-222

      License Distribution Protocols from Optical Media Fingerprints

    3. No Access

      Book Chapter

      Pages 223-233

      Anti-counterfeiting: Mixing the Physical and the Digital World

  6. Hardware-Security in Contactless Tokens

    1. Front Matter

      Pages 235-235

    2. No Access

      Book Chapter

      Pages 237-257

      Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware

    3. No Access

      Book Chapter

      Pages 259-279

      Contactless Security Token Enhanced Security by Using New Hardware Features in Cryptographic-Based Security Mechanisms

    4. No Access

      Book Chapter

      Pages 281-305

      Enhancing RFID Security and Privacy by Physically Unclonable Functions

  7. Hardware-based Security Architectures and Applications

    1. Front Matter

      Pages 307-307

    2. No Access

      Book Chapter

      Pages 309-329

      Authentication of Processor Hardware Leveraging Performance Limits in Detailed Simulations and Emulations

    3. No Access

      Book Chapter

      Pages 331-348

      Signal Authentication in Trusted Satellite Navigation Receivers

    4. No Access

      Book Chapter

      Pages 349-366

      On the Limits of Hypervisor- and Virtual Machine Monitor-Based Isolation

    5. No Access

      Book Chapter

      Pages 367-386

      Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version)*

    6. No Access

      Book Chapter

      Pages 387-407

      Towards Reliable Remote Healthcare Applications Using Combined Fuzzy Extraction