By Topic

Invited Talk 2

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Tuyls, P. ; CTO, Intrinsic-ID Ltd., Eindhoven, Netherlands

Hardware security is essential to the prevention of cloning, theft of service and tampering. Effective hardware security starts with secure key storage. The level of security provided by a key is dependent upon the effort an attacker needs to expend to compromise the key. The sophistication of the tools that are used to carry out such attacks has increased significantly over the years, compromising the protection of traditional key-storage approaches. A radically new approach is needed to counter this increased threat. Rather than trying harder to conceal the key in the hardware, a revolutionary approach has emerged in which the key is simply not stored. This new approach to hardware security relies on the unique electronic "fingerprint" inherent in every semiconductor device and is known as Hardware Intrinsic Security (HIS).

Published in:

Bio-inspired Learning and Intelligent Systems for Security, 2009. BLISS '09. Symposium on

Date of Conference:

20-21 Aug. 2009