Computer Engineering Seminar
Secure Vehicle-to-Vehicle Communication
Add to Google Calendar
This talk gives an introduction to security in embedded systems. The talk points out some of the major differences between embedded security and Internet security. Embedded devices which are ever growing in quantity and which are becoming more ubiquitous require specific security technologies to thwart counterfeiting, firmware manipulation, cloning etc. Typical methods to protect embedded systems against such attacks are based on cryptography and secure hardware platforms. The talk will present some typical security solutions such as secure software download, signature verification, secure feature activation, etc. Also, this talk presents several attacks against embedded devices and possible countermeasures. Side channel attacks analyze and evaluate the time-varying physical properties of embedded devices. Typical side channels are the execution time, power consumption and electromagnetic radiation of ciphers implemented in embedded devices such as smart cards. It is shown that side channel leakage can be exploited to extract secret keys. Conversely, it is shown how these attacks can be effectively prevented with protection measures and how these countermeasures influence the performance and costs of an implementation. A popular reverse engineering attack on Mifare-based contactless smart card chips, which are used in many different countries, e.g. the Boston Charlie metro card, is reviewed.
Dr. Kai Schramm is CTO of Escrypt Inc., supervising the technical implementation of projects and providing unique expertise to customers. From 2006 to 2007, Dr. Schramm worked at the security engineering group of Renesas Technologies in the UK as a consultant. He studied electrical engineering and computer science at Purdue University in the USA and at the University of Bochum in Germany. In 2006, he received a Ph.D. at the University of Bochum with a focus on applied data security and cryptography and published numerous scientific articles. Dr. Schramm has worked world-wide as a security researcher, consultant and developer at diverse sites such as the IBM Watson Research Center in Hawthorne, New York, the Infineon Technologies smart card department in Munich, Germany, and the Hitachi Central Research Laboratory in Tokyo, Japan.