Exploring and Preventing Cryptographic Hardware Backdoors Protecting the Intern...
Exploring and Preventing Cryptographic Hardware Backdoors Protecting the Internet of Things against Next Generation Attacks
The digital landscape is currently undergoing an evolution towards the Internet of Things. The IoT comes with a dramatically increased threat potential, as attacks can endanger human life and can lead to a massive loss of privacy...
ver más
¿Tienes un proyecto y buscas un partner? Gracias a nuestro motor inteligente podemos recomendarte los mejores socios y ponerte en contacto con ellos. Te lo explicamos en este video
Proyectos interesantes
REWOCRYPT
Theoretically Sound Real World Cryptography
1M€
Cerrado
Cathedral
Post Snowden Circuits and Design Methods for Security
2M€
Cerrado
LightCrypt
New Directions in Lightweight Cryptanalysis
1M€
Cerrado
Fecha límite de participación
Sin fecha límite de participación.
Descripción del proyecto
The digital landscape is currently undergoing an evolution towards the Internet of Things. The IoT comes with a dramatically increased threat potential, as attacks can endanger human life and can lead to a massive loss of privacy of (European) citizens. A particular dangerous class of attacks manipulates the cryptographic algorithms in the underlying hardware. Backdoors in the cryptography of IoT devices can lead to system-wide loss of security. This proposal has the ambitious goal to comprehensively understand and counter low-level backdoor attacks. The required research consists of two major modules:
1) The development of an encompassing understanding of how hardware manipulations of cryptographic functions can actually be performed, and what the consequences are for the system security. Exploring attacks is fundamental for designing strong countermeasures, analogous to the role of cryptanalysis in cryptology.
2) The development of hardware countermeasures that provide systematic protection against malicious manipulations. In contrast to detection-based methods which dominate the literature, our approach will be pro-active. We will develop solutions for instances of important problems, including hardware reverse engineering and hardware hiding. Little is known about the limits of and optimum approaches to both problems in specific settings.
Beyond prevention of hardware Trojans, the research will have applications in IP protection and will spark research in the theory of computer science community.