Abstract
As the value of data on computing systems increases and operating systems become more secure, physical attacks on computing systems to steal or modify assets become more likely. This technology requires constant review and improvement, just as other competitive technologies need review to stay at the leading edge.
This paper describes known physical attacks, ranging from simple attacks that require little skill or resource, to complex attacks that require trained, technical people and considerable resources. Physical security methods to deter or prevent these attacks are presented. The intent is to match protection methods with the attack methods in terms of complexity and cost. In this way cost effective protection can be produced across a wide range of systems and needs.
Specific technical mechanisms now in use are shown, as well as mechanisms proposed for future use. Common design problems and solutions are discussed with consideration for manufacturing.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
R. Anderson, M. Kuhn, ‘Tamper Resistance-A Cautionary Note’, The Second USENIX Workshop on Electronic Commerce Proceedings, Oakland, California, November 18-21, 1996, pp 1–11, ISBN 1-880446-83-96.
R. Anderson, M. Kuhn, ‘Low Cost Attacks on Tamper Resistant Devices’
R. E. Anderson, ‘Bank Security’, Butterworth Publishers 1981, pp. 9l–93.
S. Chari, C.S. Jutla. J.R. Rao, and P. Rohatgi. ‘A Cautionary note regarding evaluation of AES candidates on smart cards’. Proceedings of Second AES Conference, Rome, Mar 1999.
David Chaum, ‘Concepts for Design of Tamper Responding Systems’, Advances inCryptology, Proceedings of Crypto’ 83, Plenum Press 1984, pp.387-392.
Andrew l. Clark, ‘Physical Protection of Cryptographic Devices’, presented atEurocrypt’ 87, Amsterdam.
G. P. Double, ‘Physical Security for Transaction Systems: A Design Methodology’, IBM Technical Report, TR 83.227 IBM 1990.
P. Kocher, J. Jaffe and B. Jun. ‘Introduction to Differential Power Analysis and Related Attacks.’ Manuscript, Cryptography Research, Inc. 1998.
M. Kuhn and R. Anderson, ‘Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations’, Information Hiding 1998, LNCS 1525, pp. 124–142, 1998.
W. L. Price, ‘Physical Security of Transaction Devices’, NPL Technical Memo DITC 4/86, National Physical Laboratory, Jan, 1986.
S.W. Smith, S.H. Weingart, ‘Building a High Performance, Programmable Secure Coprocessor.’ Computer Networks (Special Issue on Computing Network Security). 31: 831–860. April 1999.
S.W. Smith, V. Austel, R. Perez, S. Weingart. ‘Validating a High-Performance, Programmable Secure Coprocessor or, the World’s First FIPS 140-1 Level 4.’ 22nd National Information Systems Security Cconerence, October 199.
S. H. Weingart, ‘Physical Security for the uABYSS System’, Proceedings of IEEE Symposium on Security and Privacy 1987, IEEE Publications, pp. 52–58.
S. H. Weingart, S. White, W. Arnold, and G. Double, ‘An Evaluation System for the Physical Security of Computing Systems’, Proceedings of the Sixth Annual Computer Security Applications Conference 1990, IEEE Publications, pp. 232–243.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Weingart, S.H. (2000). Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses. In: Koç, Ç.K., Paar, C. (eds) Cryptographic Hardware and Embedded Systems — CHES 2000. CHES 2000. Lecture Notes in Computer Science, vol 1965. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44499-8_24
Download citation
DOI: https://doi.org/10.1007/3-540-44499-8_24
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41455-1
Online ISBN: 978-3-540-44499-2
eBook Packages: Springer Book Archive