TY - GEN
T1 - Sweet dreams and nightmares
T2 - 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Securing the Internet of Things, WISTP 2014
AU - Kasper, Timo
AU - Oswald, David
AU - Paar, Christof
PY - 2014/6/30
Y1 - 2014/6/30
N2 - Wireless embedded devices are predominant in the Internet of Things: Objects tagged with Radio Frequency IDentification and Near Field Communication technology, smartphones, and other embedded tokens interact from device to device and thereby often process information that is security or privacy relevant for humans. For protecting sensitive data and preventing attacks, many embedded devices employ cryptographic algorithms and authentication schemes. In the past years, various vulnerabilities have been found in commercial products that enable to bypass the security mechanisms. Since a large number of the devices in the field are in the hands of potential adversaries, implementation attacks (such as side-channel analysis and reverse engineering) can play a critical role for the overall security of a system. At hand of several examples of assailable commercial products we demonstrate the potential impact of the found security weaknesses and illustrate "how to not do it".
AB - Wireless embedded devices are predominant in the Internet of Things: Objects tagged with Radio Frequency IDentification and Near Field Communication technology, smartphones, and other embedded tokens interact from device to device and thereby often process information that is security or privacy relevant for humans. For protecting sensitive data and preventing attacks, many embedded devices employ cryptographic algorithms and authentication schemes. In the past years, various vulnerabilities have been found in commercial products that enable to bypass the security mechanisms. Since a large number of the devices in the field are in the hands of potential adversaries, implementation attacks (such as side-channel analysis and reverse engineering) can play a critical role for the overall security of a system. At hand of several examples of assailable commercial products we demonstrate the potential impact of the found security weaknesses and illustrate "how to not do it".
UR - http://www.scopus.com/inward/record.url?scp=84904107418&partnerID=8YFLogxK
U2 - 10.1007/978-3-662-43826-8_1
DO - 10.1007/978-3-662-43826-8_1
M3 - Conference contribution
AN - SCOPUS:84904107418
SN - 9783662438251
VL - 8501 LNCS
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 1
EP - 9
BT - Information Security Theory and Practice. Securing the Internet of Things
A2 - Naccache, David
A2 - Sauveron, Damien
PB - Springer
Y2 - 30 June 2014 through 2 July 2014
ER -