Summary
The digital landscape is currently undergoing an evolution towards the Internet of Things. The IoT comes with a dramatically increased threat potential, as attacks can endanger human life and can lead to a massive loss of privacy of (European) citizens. A particular dangerous class of attacks manipulates the cryptographic algorithms in the underlying hardware. Backdoors in the cryptography of IoT devices can lead to system-wide loss of security. This proposal has the ambitious goal to comprehensively understand and counter low-level backdoor attacks. The required research consists of two major modules:
1) The development of an encompassing understanding of how hardware manipulations of cryptographic functions can actually be performed, and what the consequences are for the system security. Exploring attacks is fundamental for designing strong countermeasures, analogous to the role of cryptanalysis in cryptology.
2) The development of hardware countermeasures that provide systematic protection against malicious manipulations. In contrast to detection-based methods which dominate the literature, our approach will be pro-active. We will develop solutions for instances of important problems, including hardware reverse engineering and hardware hiding. Little is known about the limits of and optimum approaches to both problems in specific settings.
Beyond prevention of hardware Trojans, the research will have applications in IP protection and will spark research in the theory of computer science community.
1) The development of an encompassing understanding of how hardware manipulations of cryptographic functions can actually be performed, and what the consequences are for the system security. Exploring attacks is fundamental for designing strong countermeasures, analogous to the role of cryptanalysis in cryptology.
2) The development of hardware countermeasures that provide systematic protection against malicious manipulations. In contrast to detection-based methods which dominate the literature, our approach will be pro-active. We will develop solutions for instances of important problems, including hardware reverse engineering and hardware hiding. Little is known about the limits of and optimum approaches to both problems in specific settings.
Beyond prevention of hardware Trojans, the research will have applications in IP protection and will spark research in the theory of computer science community.
Unfold all
/
Fold all
More information & hyperlinks
Web resources: | https://cordis.europa.eu/project/id/695022 |
Start date: | 01-10-2016 |
End date: | 30-09-2021 |
Total budget - Public funding: | 2 498 286,00 Euro - 2 498 286,00 Euro |
Cordis data
Original description
The digital landscape is currently undergoing an evolution towards the Internet of Things. The IoT comes with a dramatically increased threat potential, as attacks can endanger human life and can lead to a massive loss of privacy of (European) citizens. A particular dangerous class of attacks manipulates the cryptographic algorithms in the underlying hardware. Backdoors in the cryptography of IoT devices can lead to system-wide loss of security. This proposal has the ambitious goal to comprehensively understand and counter low-level backdoor attacks. The required research consists of two major modules:1) The development of an encompassing understanding of how hardware manipulations of cryptographic functions can actually be performed, and what the consequences are for the system security. Exploring attacks is fundamental for designing strong countermeasures, analogous to the role of cryptanalysis in cryptology.
2) The development of hardware countermeasures that provide systematic protection against malicious manipulations. In contrast to detection-based methods which dominate the literature, our approach will be pro-active. We will develop solutions for instances of important problems, including hardware reverse engineering and hardware hiding. Little is known about the limits of and optimum approaches to both problems in specific settings.
Beyond prevention of hardware Trojans, the research will have applications in IP protection and will spark research in the theory of computer science community.
Status
CLOSEDCall topic
ERC-ADG-2015Update Date
27-04-2024
Images
No images available.
Geographical location(s)