ASIDS - Advanced Secure Identification Systems

  • Steger, Christian (Co-Investigator (CoI))
  • Oppermann, Felix Jonathan (Co-Investigator (CoI))
  • Kreiner, Christian Josef (Co-Investigator (CoI))
  • Krampl, Florian (Co-Investigator (CoI))
  • Maierl, Philipp (Co-Investigator (CoI))
  • Sinnhofer, Andreas Daniel (Co-Investigator (CoI))
  • Hechl, Andreas (Co-Investigator (CoI))

Project: Research project

Project Details


During the development and production of secure smartcard products there is a need for a secure exchange of trusted data between multiple parties (Card manufacturer, OS manufacturer, customer, etc.). Goal of this research project is to establish a comprehensive workflow that will cover the steps from customer requirements over product configuration, verification, production and delivery in consideration of high security requirements. Especially the interfaces between each party needs to be designed with care, since it is easy to leave an open security leak where an attacker can retrieve master keys and other trusted data. Aim is to develop a generic architecture to support the wide variety of products regarding different OS versions and hardware platforms using modern techniques of component based development. An exemplary use-case is the secure insertion of customer specific key material into the protected OS/HW structure of a smartcard and a secure retrieval process in case of symmetric key material. Furthermore, new techniques for the creation of die individual (dynamic) TP data are considered which will increase the security of the overall process and simultaneously will reduce the needed time to manufacture a chip in the factory. Smartcard products are usually evaluated according to Common Criteria which adds additional requirements to the underlying development process and the used toolchains. To reduce the needed time to develop new products, components of previously evaluated products are used by applying advanced techniques for an efficient reuse of security evaluation results (Composite Product Evaluation).
Effective start/end date1/06/1430/11/16


Explore the research topics touched on by this project. These labels are generated based on the underlying awards/grants. Together they form a unique fingerprint.
  • Combined variability management of business processes and software architectures

    Sinnhofer, A. D., Höller, A., Pühringer, P., Potzmader, K., Orthacker, C., Steger, C. & Kreiner, C., 2 Jul 2017, BMSD 2017 - Proceedings of the 7th International Symposium on Business Modeling and Software Design. SciTePress, p. 36-45 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Software configuration based on order processes

    Sinnhofer, A. D., Pühringer, P., Potzmader, K., Orthacker, C., Steger, C. & Kreiner, C., 7 Apr 2017, Business Modeling and Software Design - 6th International Symposium, BMSD 2016, Revised Selected Papers. Springer Verlag, Vol. 275. p. 200-220 21 p. (Lecture Notes in Business Information Processing; vol. 275).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Where Do All My Keys Come From?

    Sinnhofer, A. D., Steger, C., Kreiner, C. J., Oppermann, F. J., Potzmader, K. & Orthacker, C., Jul 2017, Solutions for Cyber-Physical Systems Ubiquity. IGI Global Publishing, p. 278 23 p. Chapter 11

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review