{TARDIS}: Time and remanence decay in {SRAM} to implement secure protocols on embedded devices without clocks

A Rahmati, M Salajegheh, D Holcomb… - 21st USENIX Security …, 2012 - usenix.org
21st USENIX Security Symposium (USENIX Security 12), 2012usenix.org
Lack of a locally trustworthy clock makes security protocols challenging to implement on
batteryless embedded devices such as contact smartcards, contactless smartcards, and
RFID tags. A device that knows how much time has elapsed between queries from an
untrusted reader could better protect against attacks that depend on the existence of a rate-
unlimited encryption oracle.
Abstract
Lack of a locally trustworthy clock makes security protocols challenging to implement on batteryless embedded devices such as contact smartcards, contactless smartcards, and RFID tags. A device that knows how much time has elapsed between queries from an untrusted reader could better protect against attacks that depend on the existence of a rate-unlimited encryption oracle.
usenix.org
以上显示的是最相近的搜索结果。 查看全部搜索结果