The Past, Present, and Future of Physical Security Enclosures: From Battery-Backed Monitoring to PUF-Based Inherent Security and Beyond View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2018-08-15

AUTHORS

Johannes Obermaier, Vincent Immler

ABSTRACT

Withstanding physical attacks in a hostile environment is of utmost importance for nowadays electronics. However, due to the long and costly development of integrated circuits (ICs), IC-level countermeasures are typically only included in varying degree and not in every chip of a device. Therefore, multiple-chip modules requiring higher levels of security are additionally protected against tampering by a physical security enclosure, e.g., by an envelope that completely encloses the device. For decades, these physical boundaries on a device-level were monitored using battery-backed mechanisms to enable detection of an attempted physical intrusion even if the underlying system is powered off. However, the battery affects the system’s robustness, weight, prevents extended storage, and also leads to difficulties with the security mechanism while shipping the device. In this position paper, we present our assessment of various battery-backed tamper-respondent solutions and argue that while offering the intriguing benefit of instantaneous detection and response, the low-power nature of battery-backup contradicts a tamper-sensitive measurement, among other problems. We are therefore of the opinion that more effort should be spent towards enclosures that are based on tamper-evident physical unclonable functions (PUFs), as they are designated to provide a high level of security on the one hand and do not require a battery on the other hand. To further substantiate our argument, we summarize the work in this domain to also facilitate future research. More... »

PAGES

289-296

References to SciGraph publications

  • 2000. Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS — CHES 2000
  • 2017-11-22. Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs in SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING
  • 2012-12-11. A New Security Architecture for Smartcards Utilizing PUFs in ISSE 2012 SECURING ELECTRONIC BUSINESS PROCESSES
  • 2006. Read-Proof Hardware from Protective Coatings in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s41635-018-0045-2

    DOI

    http://dx.doi.org/10.1007/s41635-018-0045-2

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1106172849


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Artificial Intelligence and Image Processing", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Fraunhofer Institute for Applied and Integrated Security, Parkring 4, 85748, Garching b. M\u00fcnchen, Germany", 
              "id": "http://www.grid.ac/institutes/grid.469867.2", 
              "name": [
                "Fraunhofer Institute for Applied and Integrated Security, Parkring 4, 85748, Garching b. M\u00fcnchen, Germany"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Obermaier", 
            "givenName": "Johannes", 
            "id": "sg:person.012621751535.45", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012621751535.45"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Fraunhofer Institute for Applied and Integrated Security, Parkring 4, 85748, Garching b. M\u00fcnchen, Germany", 
              "id": "http://www.grid.ac/institutes/grid.469867.2", 
              "name": [
                "Fraunhofer Institute for Applied and Integrated Security, Parkring 4, 85748, Garching b. M\u00fcnchen, Germany"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Immler", 
            "givenName": "Vincent", 
            "id": "sg:person.011670642147.41", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011670642147.41"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/11894063_29", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005869106", 
              "https://doi.org/10.1007/11894063_29"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-658-00333-3_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041203578", 
              "https://doi.org/10.1007/978-3-658-00333-3_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44499-8_24", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1045299661", 
              "https://doi.org/10.1007/3-540-44499-8_24"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-71501-8_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1092867559", 
              "https://doi.org/10.1007/978-3-319-71501-8_11"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2018-08-15", 
        "datePublishedReg": "2018-08-15", 
        "description": "Withstanding physical attacks in a hostile environment is of utmost importance for nowadays electronics. However, due to the long and costly development of integrated circuits (ICs), IC-level countermeasures are typically only included in varying degree and not in every chip of a device. Therefore, multiple-chip modules requiring higher levels of security are additionally protected against tampering by a physical security enclosure, e.g., by an envelope that completely encloses the device. For decades, these physical boundaries on a device-level were monitored using battery-backed mechanisms to enable detection of an attempted physical intrusion even if the underlying system is powered off. However, the battery affects the system\u2019s robustness, weight, prevents extended storage, and also leads to difficulties with the security mechanism while shipping the device. In this position paper, we present our assessment of various battery-backed tamper-respondent solutions and argue that while offering the intriguing benefit of instantaneous detection and response, the low-power nature of battery-backup contradicts a tamper-sensitive measurement, among other problems. We are therefore of the opinion that more effort should be spent towards enclosures that are based on tamper-evident physical unclonable functions (PUFs), as they are designated to provide a high level of security on the one hand and do not require a battery on the other hand. To further substantiate our argument, we summarize the work in this domain to also facilitate future research.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s41635-018-0045-2", 
        "inLanguage": "en", 
        "isAccessibleForFree": false, 
        "isPartOf": [
          {
            "id": "sg:journal.1290439", 
            "issn": [
              "2509-3428", 
              "2509-3436"
            ], 
            "name": "Journal of Hardware and Systems Security", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "4", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "2"
          }
        ], 
        "keywords": [
          "Physical Unclonable Functions", 
          "low-power nature", 
          "multiple-chip modules", 
          "inherent security", 
          "security mechanisms", 
          "physical intrusion", 
          "intriguing benefits", 
          "hostile environment", 
          "physical attacks", 
          "Unclonable Functions", 
          "devices", 
          "security", 
          "costly development", 
          "instantaneous detection", 
          "system robustness", 
          "batteries", 
          "electronics", 
          "chip", 
          "utmost importance", 
          "circuit", 
          "physical boundaries", 
          "detection", 
          "robustness", 
          "attacks", 
          "module", 
          "position paper", 
          "countermeasures", 
          "paper", 
          "monitoring", 
          "environment", 
          "solution", 
          "system", 
          "intrusion", 
          "work", 
          "future", 
          "storage", 
          "problem", 
          "enclosure", 
          "domain", 
          "mechanism", 
          "measurements", 
          "hand", 
          "more effort", 
          "benefits", 
          "envelope", 
          "nature", 
          "development", 
          "high levels", 
          "efforts", 
          "boundaries", 
          "research", 
          "decades", 
          "prevents", 
          "function", 
          "levels", 
          "difficulties", 
          "present", 
          "degree", 
          "importance", 
          "past", 
          "response", 
          "future research", 
          "weight", 
          "assessment", 
          "contradicts", 
          "argument", 
          "opinion", 
          "nowadays electronics", 
          "IC-level countermeasures", 
          "physical security enclosure", 
          "security enclosure", 
          "battery-backed mechanisms", 
          "battery-backed tamper-respondent solutions", 
          "tamper-respondent solutions", 
          "battery-backup contradicts", 
          "tamper-sensitive measurement", 
          "tamper-evident physical unclonable functions"
        ], 
        "name": "The Past, Present, and Future of Physical Security Enclosures: From Battery-Backed Monitoring to PUF-Based Inherent Security and Beyond", 
        "pagination": "289-296", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1106172849"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s41635-018-0045-2"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s41635-018-0045-2", 
          "https://app.dimensions.ai/details/publication/pub.1106172849"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2021-11-01T18:33", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20211101/entities/gbq_results/article/article_785.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s41635-018-0045-2"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s41635-018-0045-2'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s41635-018-0045-2'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s41635-018-0045-2'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s41635-018-0045-2'


     

    This table displays all metadata directly associated to this object as RDF triples.

    158 TRIPLES      22 PREDICATES      106 URIs      94 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s41635-018-0045-2 schema:about anzsrc-for:08
    2 anzsrc-for:0801
    3 schema:author N49537f4e500c429aaa01a4a25a6d0557
    4 schema:citation sg:pub.10.1007/11894063_29
    5 sg:pub.10.1007/3-540-44499-8_24
    6 sg:pub.10.1007/978-3-319-71501-8_11
    7 sg:pub.10.1007/978-3-658-00333-3_18
    8 schema:datePublished 2018-08-15
    9 schema:datePublishedReg 2018-08-15
    10 schema:description Withstanding physical attacks in a hostile environment is of utmost importance for nowadays electronics. However, due to the long and costly development of integrated circuits (ICs), IC-level countermeasures are typically only included in varying degree and not in every chip of a device. Therefore, multiple-chip modules requiring higher levels of security are additionally protected against tampering by a physical security enclosure, e.g., by an envelope that completely encloses the device. For decades, these physical boundaries on a device-level were monitored using battery-backed mechanisms to enable detection of an attempted physical intrusion even if the underlying system is powered off. However, the battery affects the system’s robustness, weight, prevents extended storage, and also leads to difficulties with the security mechanism while shipping the device. In this position paper, we present our assessment of various battery-backed tamper-respondent solutions and argue that while offering the intriguing benefit of instantaneous detection and response, the low-power nature of battery-backup contradicts a tamper-sensitive measurement, among other problems. We are therefore of the opinion that more effort should be spent towards enclosures that are based on tamper-evident physical unclonable functions (PUFs), as they are designated to provide a high level of security on the one hand and do not require a battery on the other hand. To further substantiate our argument, we summarize the work in this domain to also facilitate future research.
    11 schema:genre article
    12 schema:inLanguage en
    13 schema:isAccessibleForFree false
    14 schema:isPartOf N41039077b92b48dfbcfb8e2106420e84
    15 Nca6124ec55904849863d515cb5c7d9b4
    16 sg:journal.1290439
    17 schema:keywords IC-level countermeasures
    18 Physical Unclonable Functions
    19 Unclonable Functions
    20 argument
    21 assessment
    22 attacks
    23 batteries
    24 battery-backed mechanisms
    25 battery-backed tamper-respondent solutions
    26 battery-backup contradicts
    27 benefits
    28 boundaries
    29 chip
    30 circuit
    31 contradicts
    32 costly development
    33 countermeasures
    34 decades
    35 degree
    36 detection
    37 development
    38 devices
    39 difficulties
    40 domain
    41 efforts
    42 electronics
    43 enclosure
    44 envelope
    45 environment
    46 function
    47 future
    48 future research
    49 hand
    50 high levels
    51 hostile environment
    52 importance
    53 inherent security
    54 instantaneous detection
    55 intriguing benefits
    56 intrusion
    57 levels
    58 low-power nature
    59 measurements
    60 mechanism
    61 module
    62 monitoring
    63 more effort
    64 multiple-chip modules
    65 nature
    66 nowadays electronics
    67 opinion
    68 paper
    69 past
    70 physical attacks
    71 physical boundaries
    72 physical intrusion
    73 physical security enclosure
    74 position paper
    75 present
    76 prevents
    77 problem
    78 research
    79 response
    80 robustness
    81 security
    82 security enclosure
    83 security mechanisms
    84 solution
    85 storage
    86 system
    87 system robustness
    88 tamper-evident physical unclonable functions
    89 tamper-respondent solutions
    90 tamper-sensitive measurement
    91 utmost importance
    92 weight
    93 work
    94 schema:name The Past, Present, and Future of Physical Security Enclosures: From Battery-Backed Monitoring to PUF-Based Inherent Security and Beyond
    95 schema:pagination 289-296
    96 schema:productId Ne4d977f78f2745f9b4eb7d7cc6a8ffde
    97 Nffb912a691474edab272f67735d71dbc
    98 schema:sameAs https://app.dimensions.ai/details/publication/pub.1106172849
    99 https://doi.org/10.1007/s41635-018-0045-2
    100 schema:sdDatePublished 2021-11-01T18:33
    101 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    102 schema:sdPublisher N6253ef075b8342d197df010a05779156
    103 schema:url https://doi.org/10.1007/s41635-018-0045-2
    104 sgo:license sg:explorer/license/
    105 sgo:sdDataset articles
    106 rdf:type schema:ScholarlyArticle
    107 N24587f42382c4161b12aa4cb01f3609d rdf:first sg:person.011670642147.41
    108 rdf:rest rdf:nil
    109 N41039077b92b48dfbcfb8e2106420e84 schema:volumeNumber 2
    110 rdf:type schema:PublicationVolume
    111 N49537f4e500c429aaa01a4a25a6d0557 rdf:first sg:person.012621751535.45
    112 rdf:rest N24587f42382c4161b12aa4cb01f3609d
    113 N6253ef075b8342d197df010a05779156 schema:name Springer Nature - SN SciGraph project
    114 rdf:type schema:Organization
    115 Nca6124ec55904849863d515cb5c7d9b4 schema:issueNumber 4
    116 rdf:type schema:PublicationIssue
    117 Ne4d977f78f2745f9b4eb7d7cc6a8ffde schema:name doi
    118 schema:value 10.1007/s41635-018-0045-2
    119 rdf:type schema:PropertyValue
    120 Nffb912a691474edab272f67735d71dbc schema:name dimensions_id
    121 schema:value pub.1106172849
    122 rdf:type schema:PropertyValue
    123 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    124 schema:name Information and Computing Sciences
    125 rdf:type schema:DefinedTerm
    126 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
    127 schema:name Artificial Intelligence and Image Processing
    128 rdf:type schema:DefinedTerm
    129 sg:journal.1290439 schema:issn 2509-3428
    130 2509-3436
    131 schema:name Journal of Hardware and Systems Security
    132 schema:publisher Springer Nature
    133 rdf:type schema:Periodical
    134 sg:person.011670642147.41 schema:affiliation grid-institutes:grid.469867.2
    135 schema:familyName Immler
    136 schema:givenName Vincent
    137 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011670642147.41
    138 rdf:type schema:Person
    139 sg:person.012621751535.45 schema:affiliation grid-institutes:grid.469867.2
    140 schema:familyName Obermaier
    141 schema:givenName Johannes
    142 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012621751535.45
    143 rdf:type schema:Person
    144 sg:pub.10.1007/11894063_29 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005869106
    145 https://doi.org/10.1007/11894063_29
    146 rdf:type schema:CreativeWork
    147 sg:pub.10.1007/3-540-44499-8_24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045299661
    148 https://doi.org/10.1007/3-540-44499-8_24
    149 rdf:type schema:CreativeWork
    150 sg:pub.10.1007/978-3-319-71501-8_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1092867559
    151 https://doi.org/10.1007/978-3-319-71501-8_11
    152 rdf:type schema:CreativeWork
    153 sg:pub.10.1007/978-3-658-00333-3_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041203578
    154 https://doi.org/10.1007/978-3-658-00333-3_18
    155 rdf:type schema:CreativeWork
    156 grid-institutes:grid.469867.2 schema:alternateName Fraunhofer Institute for Applied and Integrated Security, Parkring 4, 85748, Garching b. München, Germany
    157 schema:name Fraunhofer Institute for Applied and Integrated Security, Parkring 4, 85748, Garching b. München, Germany
    158 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...