Projects per year
Abstract
Nowadays, cyber-physical systems are omnipresent in our daily lives and are increasingly used to process confidential data. While the variety of portable devices we use excessively at home and at work is steadily increasing, their security vulnerabilities are often not noticed by the user. Therefore, portable devices such as wearables are becoming more and more interesting for adversaries. Thus, a robust and secure software design is required for the implementation of cryptographic communication protocols and encryption algorithms. While these topics are well discussed and subject to further research activities, the issue of provisioning the initial device setup is widely uncovered. However, the protection of the initial setup is as important as the protection of the confidential data during the time in use. In this work, the authors will present solutions for a secure initialization of security critical integrated circuits (ICs).
Original language | English |
---|---|
Title of host publication | Solutions for Cyber-Physical Systems Ubiquity |
Publisher | IGI Global Publishing |
Pages | 278 |
Number of pages | 23 |
ISBN (Electronic) | 9781522528463 |
ISBN (Print) | 9781522528456, 1522528458 |
DOIs | |
Publication status | Published - Jul 2017 |
Fingerprint
Dive into the research topics of 'Where Do All My Keys Come From?'. Together they form a unique fingerprint.-
Industrial Informatics
Macher, G., Dobaj, J., Krug, T., Blažević, R. & Veledar, O.
1/09/12 → 31/12/24
Project: Research area
-
Hardware/Software-Codesign
Steger, C., Seifert, C., Stelzer, P., Fiala, G. & Basic, F.
1/01/95 → 31/12/24
Project: Research area
-
ASIDS - Advanced Secure Identification Systems
Steger, C., Oppermann, F. J., Kreiner, C. J., Krampl, F., Maierl, P., Sinnhofer, A. D. & Hechl, A.
1/06/14 → 30/11/16
Project: Research project