DocumentCode :
2053825
Title :
IC activation and user authentication for security-sensitive systems
Author :
Huang, Jiawei ; Lach, John
Author_Institution :
Dept. of Electr. & Comput. Eng., Virginia Univ., Charlottesville, VA
fYear :
2008
fDate :
9-9 June 2008
Firstpage :
76
Lastpage :
80
Abstract :
A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circuits (ICs). Failure to protect such devices can have consequences ranging from the loss of financial revenue to the loss of human lives. The key to providing protection does not lie in the prevention of theft but in a secure IC activation and user authentication procedure so that an adversary has nothing to gain by acquiring the physical hardware. The proposed protection scheme is robust against various types of malicious attack, such as reverse engineering to extract the circuit layout, brute-forcing the access key, and FIBing. The scheme provides the capability both for one-time or every-powerup activation and for every-powerup user authentication. Given the resource constraints of many security-sensitive hardware systems (such as those deployed in remote locations or carried in combat arenas), this paper proposes and evaluates the cost of several techniques for achieving secure activation and authentication.
Keywords :
authorisation; integrated circuits; reverse engineering; IC activation; access key brute-forcing; circuit layout; combat arenas; integrated circuits; malicious attack; protection scheme; remote locations; reverse engineering; security-sensitive systems; signature generation; user authentication; user authentication procedure; Application software; Application specific integrated circuits; Authentication; Costs; Hardware; Humans; Manufacturing; Protection; Reverse engineering; Security; IC activation; PUF; reverse engineering; security-sensitive hardware protection; signature generation; user authentication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on
Conference_Location :
Anaheim, CA
Print_ISBN :
978-1-4244-2401-6
Type :
conf
DOI :
10.1109/HST.2008.4559056
Filename :
4559056
Link To Document :
بازگشت