Drifting Keys: Impersonation detection for constrained devices
We introduce Drifting Keys (DKs), a simple new approach to detecting device impersonation. DKs enable detection of complete compromise by an attacker of the device and its secret state, e.g., cryptographic keys. A DK evolves within a device randomly over time. Thus an attacker will create DKs that r...
Main Authors: | Bowers, Kevin D., Juels, Ari, Rivest, Ronald L., Shen, Emily H. |
---|---|
Other Authors: | Lincoln Laboratory |
Format: | Article |
Language: | en_US |
Published: |
Institute of Electrical and Electronics Engineers (IEEE)
2015
|
Online Access: | http://hdl.handle.net/1721.1/93880 https://orcid.org/0000-0002-7105-3690 |
Similar Items
-
Honeywords: making password-cracking detectable
by: Juels, Ari, et al.
Published: (2014) -
How to tell if your cloud files are vulnerable to drive crashes
by: Bowers, Kevin D., et al.
Published: (2012) -
Defending against the Unknown Enemy: Applying FlipIt to System Security
by: Bowers, Kevin D., et al.
Published: (2014) -
Impersonal Intimacies
by: Kari Barclay
Published: (2022-01-01) -
“Escape to Impersonality”
by: Aaron Greenberg
Published: (2022-09-01)