Chapter 14: Physical Tamper Resistance
- Introduction
- History
- High-end physically secure processors
(an inside view)
- Evaluation
- Medium-security processors
- Smartcards and microcontrollers
- Architecture
- Security evolution
(ST16 data bus
and FIB crossing)
- How to hack a smartcard
- How to hack a smartcard
- How to hack a smartcard
- How to hack a smartcard
- How to hack a smartcard
- How to hack a smartcard
- How to hack a smartcard
- The state of the art
- Defense in depth
- Tamper resistance versus tamper evidence
- Stop loss
- What goes wrong
- Protecting the wrong things: Architectural errors
- Protecting the wrong things: Security-by-obscurity and
evaluation errors
- Protecting things wrongly: Protocol failure
- Function creep
- What should be protected?
- Summary
Chapter 14 homework problems
and solutions