Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Tamper Resistance
Post: #1

To secure digital assets, a tasteful integration of a variety of technologies and processes is necessary. Tamper-resistance is being increasingly used as an important piece of a more comprehensive security system. It provides an effective barrier to entry and protects digital assets in the embedded systems from most people and most attacks. Embedded systems pose unique security challenges because they are largely used in relationships where one party wants to put a secure, embedded device, in the hands of another, with the assurance that the second party cannot modify/hack the device. First, we outline the major attacks that threaten the security of an embedded system.

The vulnerability landscape of an embedded system is a vast expanse of attacks. A good understanding of the threats is necessary so that countermeasures can be devised to protect against threats that pose the greatest risk. Second, we present countermeasures and discuss their effectiveness in protecting the crown jewels of an embedded system: boot code, operating system software and embedded hardware. A clear understanding of attacks and countermeasures enables a system architect to make rational investment decisions in designing a secure, embedded system.

Tamper-resistant storage techniques provide varying degrees of authenticity and integrity for data. This paper surveys five implemented tamper-resistant storage systems that use encryption, cryptographic hashes, digital signatures and error-correction primitives to provide varying levels of data protection. Five key evaluation points for such systems are: (1) authenticity guarantees, (2) integrity guarantees, (3) confidentiality guarantees, (4) performance overhead attributed to security, and (5) scalability concerns. Immutable storage techniques can enhance tamper-resistant techniques. Digital watermarking is not appropriate for tamper-resistance implemented in the storage system rather than at the application level.
 

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Watermarking And Tamper proofing Tool For Software Protection seminar class 0 949 06-04-2011 04:03 PM
Last Post: seminar class