diff options
Diffstat (limited to 'paper/ihsm_paper.tex')
-rw-r--r-- | paper/ihsm_paper.tex | 9 |
1 files changed, 5 insertions, 4 deletions
diff --git a/paper/ihsm_paper.tex b/paper/ihsm_paper.tex index 56ac7c1..375b096 100644 --- a/paper/ihsm_paper.tex +++ b/paper/ihsm_paper.tex @@ -180,10 +180,11 @@ similar approaches to tamper detection~\cite{obermaier2018,drimer2008,anderson20 Shifting our focus from industry use to the academic state of the art, in~\cite{immler2019}, Immler et al. describe an HSM based on precise capacitance measurements of a security mesh, creating a PUF from the mesh. In contrast to -traditional meshes, they use a large number of individual traces. Their concept promises a very high degree of -protection, but is limited in area covered and component height, as well as the high cost of the advanced analog -circuitry required for monitoring. A core component of their design is that they propose its use as a PUF to allow for -protection even when powered off, similar to a smart card---but the design is not limited to this use. +traditional meshes, they use a large number of individual traces (more than 30 in their example). Their concept +promises a very high degree of protection, but is limited in area covered and component height, as well as the high cost +of the advanced analog circuitry required for monitoring. A core component of their design is that they propose its use +as a PUF to allow for protection even when powered off, similar to a smart card---but the design is not limited to this +use. In~\cite{tobisch2020}, Tobisch et al.\ describe a construction technique for a hardware security module that is based on a WiFi transceiver inside a conductive enclosure. In their design, a reference signal is sent into the RF cavity formed |