Where Do All My Keys Come From?

Andreas Daniel Sinnhofer, Christian Steger, Christian Josef Kreiner, Felix Jonathan Oppermann, Klaus Potzmader, Clemens Orthacker

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Abstract

Nowadays, cyber-physical systems are omnipresent in our daily lives and are increasingly used to process confidential data. While the variety of portable devices we use excessively at home and at work is steadily increasing, their security vulnerabilities are often not noticed by the user. Therefore, portable devices such as wearables are becoming more and more interesting for adversaries. Thus, a robust and secure software design is required for the implementation of cryptographic communication protocols and encryption algorithms. While these topics are well discussed and subject to further research activities, the issue of provisioning the initial device setup is widely uncovered. However, the protection of the initial setup is as important as the protection of the confidential data during the time in use. In this work, the authors will present solutions for a secure initialization of security critical integrated circuits (ICs).
LanguageEnglish
Title of host publicationSolutions for Cyber-Physical Systems Ubiquity
PublisherIGI Global Publishing
Pages278
Number of pages23
ISBN (Electronic)9781522528463
ISBN (Print)9781522528456, 1522528458
DOIs
StatusPublished - Jul 2017

Fingerprint

Software design
Cryptography
Integrated circuits
Network protocols
Cyber Physical System

Cite this

Sinnhofer, A. D., Steger, C., Kreiner, C. J., Oppermann, F. J., Potzmader, K., & Orthacker, C. (2017). Where Do All My Keys Come From? In Solutions for Cyber-Physical Systems Ubiquity (pp. 278). [Chapter 11] IGI Global Publishing. DOI: 10.4018/978-1-5225-2845-6.ch011

Where Do All My Keys Come From? / Sinnhofer, Andreas Daniel; Steger, Christian; Kreiner, Christian Josef; Oppermann, Felix Jonathan; Potzmader, Klaus; Orthacker, Clemens.

Solutions for Cyber-Physical Systems Ubiquity. IGI Global Publishing, 2017. p. 278 Chapter 11.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Sinnhofer, AD, Steger, C, Kreiner, CJ, Oppermann, FJ, Potzmader, K & Orthacker, C 2017, Where Do All My Keys Come From? in Solutions for Cyber-Physical Systems Ubiquity., Chapter 11, IGI Global Publishing, pp. 278. DOI: 10.4018/978-1-5225-2845-6.ch011
Sinnhofer AD, Steger C, Kreiner CJ, Oppermann FJ, Potzmader K, Orthacker C. Where Do All My Keys Come From? In Solutions for Cyber-Physical Systems Ubiquity. IGI Global Publishing. 2017. p. 278. Chapter 11. Available from, DOI: 10.4018/978-1-5225-2845-6.ch011
Sinnhofer, Andreas Daniel ; Steger, Christian ; Kreiner, Christian Josef ; Oppermann, Felix Jonathan ; Potzmader, Klaus ; Orthacker, Clemens. / Where Do All My Keys Come From?. Solutions for Cyber-Physical Systems Ubiquity. IGI Global Publishing, 2017. pp. 278
@inbook{80d95425acdf45c3833caef0c1b967d7,
title = "Where Do All My Keys Come From?",
abstract = "Nowadays, cyber-physical systems are omnipresent in our daily lives and are increasingly used to process confidential data. While the variety of portable devices we use excessively at home and at work is steadily increasing, their security vulnerabilities are often not noticed by the user. Therefore, portable devices such as wearables are becoming more and more interesting for adversaries. Thus, a robust and secure software design is required for the implementation of cryptographic communication protocols and encryption algorithms. While these topics are well discussed and subject to further research activities, the issue of provisioning the initial device setup is widely uncovered. However, the protection of the initial setup is as important as the protection of the confidential data during the time in use. In this work, the authors will present solutions for a secure initialization of security critical integrated circuits (ICs).",
author = "Sinnhofer, {Andreas Daniel} and Christian Steger and Kreiner, {Christian Josef} and Oppermann, {Felix Jonathan} and Klaus Potzmader and Clemens Orthacker",
year = "2017",
month = "7",
doi = "10.4018/978-1-5225-2845-6.ch011",
language = "English",
isbn = "9781522528456",
pages = "278",
booktitle = "Solutions for Cyber-Physical Systems Ubiquity",
publisher = "IGI Global Publishing",
address = "United States",

}

TY - CHAP

T1 - Where Do All My Keys Come From?

AU - Sinnhofer,Andreas Daniel

AU - Steger,Christian

AU - Kreiner,Christian Josef

AU - Oppermann,Felix Jonathan

AU - Potzmader,Klaus

AU - Orthacker,Clemens

PY - 2017/7

Y1 - 2017/7

N2 - Nowadays, cyber-physical systems are omnipresent in our daily lives and are increasingly used to process confidential data. While the variety of portable devices we use excessively at home and at work is steadily increasing, their security vulnerabilities are often not noticed by the user. Therefore, portable devices such as wearables are becoming more and more interesting for adversaries. Thus, a robust and secure software design is required for the implementation of cryptographic communication protocols and encryption algorithms. While these topics are well discussed and subject to further research activities, the issue of provisioning the initial device setup is widely uncovered. However, the protection of the initial setup is as important as the protection of the confidential data during the time in use. In this work, the authors will present solutions for a secure initialization of security critical integrated circuits (ICs).

AB - Nowadays, cyber-physical systems are omnipresent in our daily lives and are increasingly used to process confidential data. While the variety of portable devices we use excessively at home and at work is steadily increasing, their security vulnerabilities are often not noticed by the user. Therefore, portable devices such as wearables are becoming more and more interesting for adversaries. Thus, a robust and secure software design is required for the implementation of cryptographic communication protocols and encryption algorithms. While these topics are well discussed and subject to further research activities, the issue of provisioning the initial device setup is widely uncovered. However, the protection of the initial setup is as important as the protection of the confidential data during the time in use. In this work, the authors will present solutions for a secure initialization of security critical integrated circuits (ICs).

U2 - 10.4018/978-1-5225-2845-6.ch011

DO - 10.4018/978-1-5225-2845-6.ch011

M3 - Chapter

SN - 9781522528456

SN - 1522528458

SP - 278

BT - Solutions for Cyber-Physical Systems Ubiquity

PB - IGI Global Publishing

ER -