Using passwords for authentication has been proven vulnerable in countless security incidents. Hardware security tokens effectively prevent most password-related security issues and improve security indisputably. However, we would like to highlight that there are new threats from attackers with physical access which need to be discussed. Supply chain adversaries may manipulate devices on a large scale and install backdoors before they even reach end users. In evil maid scenarios, specific devices may even be attacked while already in use. Hence, we thoroughly investigate the security and trustworthiness of seven commercially available open source security tokens, including devices from the two market leaders: SoloKeys and Nitrokey. Unfortun...
Hardware security and trust have become a pressing issue during the last two decades due to the glob...
The rapidly adopted idea of everyday devices being interconnected and controllable from across the g...
Modern systems are mainly composed of IoT devices and Smartphones.Most of these devices use ARM proc...
Using passwords for authentication has been proven vulnerable in countless security incidents. Hardw...
In this dissertation, first, we studied the Radio-Frequency Identification (RFID) tag authentication...
Part 1: Invited PaperInternational audienceWireless embedded devices are predominant in the Internet...
The increasing prevalence of IoT devices has brought about numerous security challenges due to their...
Often overlooked, microcontrollers are the central component in embedded systems which drive the evo...
The fast development of Internet of Things (IoT) and cyber-physical systems (CPS) has triggered a la...
Modern systems are mainly composed of IoT devices and Smartphones. Most of these devices use ARM pro...
The ultimate responsibility to verify whether a newly purchased hardware security token (HST) is aut...
ABSTRACT | Security of a computer system has been tradition-ally related to the security of the soft...
The increasing reliance on digital technologies and connected systems has amplified the need for sec...
The rapid expansion of digital technologies and interconnected systems has brought about an unpreced...
The emergence of a globalized, horizontal semiconductor business model raises a set of concerns invo...
Hardware security and trust have become a pressing issue during the last two decades due to the glob...
The rapidly adopted idea of everyday devices being interconnected and controllable from across the g...
Modern systems are mainly composed of IoT devices and Smartphones.Most of these devices use ARM proc...
Using passwords for authentication has been proven vulnerable in countless security incidents. Hardw...
In this dissertation, first, we studied the Radio-Frequency Identification (RFID) tag authentication...
Part 1: Invited PaperInternational audienceWireless embedded devices are predominant in the Internet...
The increasing prevalence of IoT devices has brought about numerous security challenges due to their...
Often overlooked, microcontrollers are the central component in embedded systems which drive the evo...
The fast development of Internet of Things (IoT) and cyber-physical systems (CPS) has triggered a la...
Modern systems are mainly composed of IoT devices and Smartphones. Most of these devices use ARM pro...
The ultimate responsibility to verify whether a newly purchased hardware security token (HST) is aut...
ABSTRACT | Security of a computer system has been tradition-ally related to the security of the soft...
The increasing reliance on digital technologies and connected systems has amplified the need for sec...
The rapid expansion of digital technologies and interconnected systems has brought about an unpreced...
The emergence of a globalized, horizontal semiconductor business model raises a set of concerns invo...
Hardware security and trust have become a pressing issue during the last two decades due to the glob...
The rapidly adopted idea of everyday devices being interconnected and controllable from across the g...
Modern systems are mainly composed of IoT devices and Smartphones.Most of these devices use ARM proc...