summaryrefslogtreecommitdiff
path: root/paper/ihsm_paper.tex
diff options
context:
space:
mode:
Diffstat (limited to 'paper/ihsm_paper.tex')
-rw-r--r--paper/ihsm_paper.tex9
1 files changed, 5 insertions, 4 deletions
diff --git a/paper/ihsm_paper.tex b/paper/ihsm_paper.tex
index 56ac7c1..375b096 100644
--- a/paper/ihsm_paper.tex
+++ b/paper/ihsm_paper.tex
@@ -180,10 +180,11 @@ similar approaches to tamper detection~\cite{obermaier2018,drimer2008,anderson20
Shifting our focus from industry use to the academic state of the art, in~\cite{immler2019}, Immler et al. describe an
HSM based on precise capacitance measurements of a security mesh, creating a PUF from the mesh. In contrast to
-traditional meshes, they use a large number of individual traces. Their concept promises a very high degree of
-protection, but is limited in area covered and component height, as well as the high cost of the advanced analog
-circuitry required for monitoring. A core component of their design is that they propose its use as a PUF to allow for
-protection even when powered off, similar to a smart card---but the design is not limited to this use.
+traditional meshes, they use a large number of individual traces (more than 30 in their example). Their concept
+promises a very high degree of protection, but is limited in area covered and component height, as well as the high cost
+of the advanced analog circuitry required for monitoring. A core component of their design is that they propose its use
+as a PUF to allow for protection even when powered off, similar to a smart card---but the design is not limited to this
+use.
In~\cite{tobisch2020}, Tobisch et al.\ describe a construction technique for a hardware security module that is based on
a WiFi transceiver inside a conductive enclosure. In their design, a reference signal is sent into the RF cavity formed