06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BIBLIOGRAPHY<br />

Conference, ser. DAC '07. New York, NY, USA: ACM, 2007, pp. 914.<br />

[124] L. Bolotnyy and G. Robins, Physically Unclonable Function-Based <strong>Security</strong><br />

and Privacy in RFID Systems, in Proceedings of the Fifth IEEE International<br />

Conference on Pervasive Computing and Communications. Washington, DC,<br />

USA: IEEE Computer Society, 2007, pp. 211220. Online Available: http:<br />

//portal.acm.org/citation.cfm?id=1263542.1263714<br />

[125] D. E. Lazich and M. Wuensche, Protection of Sensitive <strong>Security</strong> Parameters in<br />

Integrated Circuits, in Mathematical Methods in Computer Science, J. Calmet,<br />

W. Geiselmann, and J. Müller-Quade, Eds. Berlin, Heidelberg: Springer-Verlag,<br />

2008, pp. 157178.<br />

[126] G. E. Suh, C. W. O'Donnell, I. Sachdev, and S. Devadas, Design and Implementation<br />

of the AEGIS Single-Chip Secure Processor Using Physical Random Function,<br />

SIGARCH Comput. Archit. News, vol. 33, pp. 2536, May 2005.<br />

[127] D. Merli, D. Schuster, F. Stumpf, and G. Sigl, Side-Channel Analysis<br />

of PUFs and Fuzzy Extractors, in Trust and Trustworthy Computing, ser.<br />

Lecture Notes in Computer Science, J. McCune, B. Balache, A. Perrig,<br />

A.-R. Sadeghi, A. Sasse, and Y. Beres, Eds. Springer Berlin / Heidelberg,<br />

2011, vol. 6740, pp. 3347, 10.1007/978-3-642-21599-5_3. Online Available:<br />

http://www.springerlink.com/content/h77526861527tg06/fulltext.pdf<br />

[128] X. Leroy, Bytecode verication on Java smart cards, Softw. Pract. Exper., vol. 32,<br />

no. 4, pp. 319340, 2002.<br />

[129] ISO/IEC 15408: Common Criteria <strong>for</strong> In<strong>for</strong>mation Technology <strong>Security</strong> Evaluation,<br />

Std. Version 2.2, Rev. 256, 2004.<br />

[130] Common Methodology <strong>for</strong> In<strong>for</strong>mation Technology <strong>Security</strong> Evaluation; Evaluation<br />

Methodology, Tech. Rep. Version 3.1, July 2009. Online Available: http:<br />

//www.commoncriteriaportal.org/thecc.html<br />

[131] E. Roback, Exploring Common Criteria: Can it Ensure that the Federal Government<br />

Gets Needed <strong>Security</strong> in Software? US govt. publication, Sept. 2003.<br />

[132] B. Schneier, Applied cryptography (2nd ed.): protocols, algorithms, and source code<br />

in C. New York, NY, USA: John Wiley & Sons, Inc., 1995.<br />

[133] A. Maiti, R. Nagesh, A. Reddy, and P. Schaumont, Physical unclonable function<br />

and true random number generator: a compact and scalable implementation, in<br />

Proceedings of the 19th ACM Great Lakes symposium on VLSI, ser. GLSVLSI '09.<br />

New York, NY, USA: ACM, 2009, pp. 425428.<br />

[134] D. E. Holcomb, W. P. Burleson, and K. Fu, Power-Up SRAM State as an Identifying<br />

Fingerprint and Source of True Random Numbers, IEEE Transactions on<br />

Computers, vol. 58, pp. 11981210, 2009.<br />

[135] S. Schulz, C. Wachsmann, and A.-R. Sadeghis, Lightweight Remote<br />

Attestation using Physical Functions, Technische Universitat Darmstadt,<br />

Darmstadt, Germany, Technical Report TR-2001-06-11, July 2011. Online<br />

Available: http://www.in<strong>for</strong>matik.tu-darmstadt.de/leadmin/user_upload/<br />

460

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!