Physical unclonable functions for device authentication and secret key generation

GE Suh, S Devadas - Proceedings of the 44th annual design automation …, 2007 - dl.acm.org
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets
from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit …

SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes

A Seshadri, M Luk, N Qu, A Perrig - Proceedings of twenty-first ACM …, 2007 - dl.acm.org
We propose SecVisor, a tiny hypervisor that ensures code integrity for commodity OS
kernels. In particular, SecVisor ensures that only user-approved code can execute in kernel …

Aegis: A single-chip secure processor

GE Suh, CW O'Donnell… - IEEE Design & Test of …, 2007 - ieeexplore.ieee.org
In this article, we introduce a single-chip secure processor called Aegis. In addition to
supporting mechanisms to authenticate the platform and software, our processor …

Moats and drawbridges: An isolation primitive for reconfigurable hardware based systems

T Huffmire, B Brotherton, G Wang… - … IEEE Symposium on …, 2007 - ieeexplore.ieee.org
Blurring the line between software and hardware, reconfigurable devices strike a balance
between the raw high speed of custom silicon and the post-fabrication flexibility of general …

Batch pairing delegation

PP Tsang, SSM Chow, SW Smith - … on Security, IWSEC 2007, Nara, Japan …, 2007 - Springer
Pairing-based cryptography (PBC) has enabled the construction of many cryptographic
protocols. However, there are scenarios when PBC is too heavyweight to use, such as when …

Offline untrusted storage with immediate detection of forking and replay attacks

M Van Dijk, J Rhodes, LFG Sarmenta… - Proceedings of the 2007 …, 2007 - dl.acm.org
We address the problemof using an untrusted server with only a trusted timestamping device
(TTD) to provide trusted storage for a large number of clients, where each client may own …

Trusted hardware: Can it be trustworthy?

CE Irvine, K Levitt - Proceedings of the 44th Annual Design Automation …, 2007 - dl.acm.org
Processing and storage of confidential or critical information is an every day occurrence in
computing systems. The trustworthiness of computing devices has become an important …

Controlled physical random functions

B Gassend, M Van Dijk, D Clarke… - Security with Noisy Data …, 2007 - Springer
The cryptographic protocols that we use in everyday life rely on the secure storage of keys in
consumer devices. Protecting these keys from invasive attackers, who open a device to steal …

People-centric urban sensing: Security challenges for the new paradigm

P Johnson, A Kapadia, D Kotz, N Triandopoulos - 2007 - digitalcommons.dartmouth.edu
We study the security challenges that arise in\emph {people-centric urban sensing}, a new
sensor-networking paradigm that leverages humans as part of the sensing infrastructure …

Used trusted co-servers to enhance security of web interaction

DM Chess, J Dyer, N Itoi, J Kravitz, ER Palmer… - US Patent …, 2007 - Google Patents
(22) Filed: Sep. 15, 2000 1,, and then said co-server carries out N functions: Fl.(i0... In)
describes What the co-server returns to party P,. The (51) Int-Cl- preferred embodiment of …