Exploring and Preventing Cryptographic Hardware Ba.. (EPoCH)
Exploring and Preventing Cryptographic Hardware Backdoors: Protecting the Internet of Things against Next-Generation Attacks
(EPoCH)
Start date: Oct 1, 2016,
End date: Sep 30, 2021
PROJECT
FINISHED
The digital landscape is currently undergoing an evolution towards the Internet of Things. The IoT comes with a dramatically increased threat potential, as attacks can endanger human life and can lead to a massive loss of privacy of (European) citizens. A particular dangerous class of attacks manipulates the cryptographic algorithms in the underlying hardware. Backdoors in the cryptography of IoT devices can lead to system-wide loss of security. This proposal has the ambitious goal to comprehensively understand and counter low-level backdoor attacks. The required research consists of two major modules:1) The development of an encompassing understanding of how hardware manipulations of cryptographic functions can actually be performed, and what the consequences are for the system security. Exploring attacks is fundamental for designing strong countermeasures, analogous to the role of cryptanalysis in cryptology.2) The development of hardware countermeasures that provide systematic protection against malicious manipulations. In contrast to detection-based methods which dominate the literature, our approach will be pro-active. We will develop solutions for instances of important problems, including hardware reverse engineering and hardware hiding. Little is known about the limits of and optimum approaches to both problems in specific settings.Beyond prevention of hardware Trojans, the research will have applications in IP protection and will spark research in the theory of computer science community.
Get Access to the 1st Network for European Cooperation
Log In