Hardware Envelope, A Secure Conveyance

Image via Fraunhofer AISEC

via Samuel H. Moore, writing at the IEEE’s Spectrum Magazine, comes word of the ‘Unhackable Envelope‘. The Fraunhofer team (developers of the Unhackable Envelope) comprised of Vincent ImmlerFraunhofer Institute for Applied and Integrated Security (AISEC), Martin KönigFraunhofer Research Institution for Microsystems and Solid State Technologies (EMFT), Johannes ObermaierFraunhofer Institute for Applied and Integrated Security (AISEC), Matthias HillerFraunhofer Institute for Applied and Integrated Security (AISEC) and Georg SiglFraunhofer Institute for Applied and Integrated Security (AISEC) & Technical University of Munich (TUM) appeared at the IEEE International Symposium on Hardware Oriented Security and Trust in Washington, D.C. last week. Additionally, the group’s paper ‘B-TREPID: Batteryless Tamper-Resistant Envelope with a PUF and Integrity Detection‘ won the 2018 Best Paper Award at the confrenece (Kudo’s are certainly in order!).

Permalink

*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://spectrum.ieee.org/tech-talk/computing/hardware/the-unhackable-envelope

Recent Posts

VMRay Closes $25 Million Series B

Digital+ Partners Leads Continuation Funding Round in Growing Automated Threat Analysis & Detection Provider, Closing its Series B Round at…

2 hours ago

The Hacker Mind Podcast: Hacking OpenWRT

For three years OpenWRT had a severe validation problem with its download package manager, until a fuzz tester found and…

2 hours ago

Goodbye to Flash – if you’re still running it, uninstall Flash Player now

It’s time to say a final “Goodbye” to Flash. (Or should that be “Good riddance”?) With earlier this week seeing…

3 hours ago

Smart DNS: Delivering the Best Subscriber Experience

This is the second in a series of blog posts that discuss how smart DNS resolvers can enhance ongoing network…

3 hours ago

New Microsoft Spear-Phishing Attack Uses Exact Domain Spoofing Tactic

Security researchers detected a new spear-phishing attack that’s using an exact domain spoofing tactic in order to impersonate Microsoft. On…

5 hours ago

6 ways to use analytics to deliver an exceptional end-user experience: Part 3

Welcome back to the last part of our three-part blog series on how to leverage analytics to deliver an exceptional…

5 hours ago