2010
DOI: 10.1007/978-3-642-14597-1_14
|View full text |Cite
|
Sign up to set email alerts
|

Trusted Firmware Services Based on TPM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Examples of these types of attacks are timing attacks timing attacks [77] or fault induction techniques [78]. • Authentication attacks: Using multi-factor authenticated schemes implemented in the TPM and storing the credentials as private keys in hardware, make this type of attack useless in case an attacker wants to fraudulently access the Blockchain [79]. • Reverse engineering attacks: TPMs by offering tamper proof protection against invasive attacks, in which an attacker attempts to modify or alter the intrinsic functioning of the hardware, learning how it works or making it work as he wants, prevent such attacks [80].…”
Section: F Security Analysismentioning
confidence: 99%
“…Examples of these types of attacks are timing attacks timing attacks [77] or fault induction techniques [78]. • Authentication attacks: Using multi-factor authenticated schemes implemented in the TPM and storing the credentials as private keys in hardware, make this type of attack useless in case an attacker wants to fraudulently access the Blockchain [79]. • Reverse engineering attacks: TPMs by offering tamper proof protection against invasive attacks, in which an attacker attempts to modify or alter the intrinsic functioning of the hardware, learning how it works or making it work as he wants, prevent such attacks [80].…”
Section: F Security Analysismentioning
confidence: 99%