Coordinatore | TECHNIKON FORSCHUNGS- UND PLANUNGSGESELLSCHAFT MBH
Organization address
address: BURGPLATZ 3A contact info |
Nazionalità Coordinatore | Austria [AT] |
Totale costo | 5˙103˙893 € |
EC contributo | 3˙350˙000 € |
Programma | FP7-ICT
Specific Programme "Cooperation": Information and communication technologies |
Code Call | FP7-ICT-2011-8 |
Funding Scheme | CP |
Anno di inizio | 2012 |
Periodo (anno-mese-giorno) | 2012-10-01 - 2015-09-30 |
# | ||||
---|---|---|---|---|
1 |
TECHNIKON FORSCHUNGS- UND PLANUNGSGESELLSCHAFT MBH
Organization address
address: BURGPLATZ 3A contact info |
AT (VILLACH) | coordinator | 0.00 |
2 |
ASSOCIATION POUR LA RECHERCHE ET LE DEVELOPPEMENT DES METHODES ET PROCESSUS INDUSTRIELS - ARMINES
Organization address
address: Boulevard Saint-Michel contact info |
FR (PARIS) | participant | 0.00 |
3 |
CASSIDIAN CYBERSECURITY SAS
Organization address
address: BOULEVARD JEAN MOULIN - ZAC DE LA CLEF SAINT PIERRE contact info |
FR (ELANCOURT) | participant | 0.00 |
4 |
COMMISSARIAT A L ENERGIE ATOMIQUE ET AUX ENERGIES ALTERNATIVES
Organization address
address: RUE LEBLANC contact info |
FR (PARIS 15) | participant | 0.00 |
5 |
ECOLE NATIONALE SUPERIEURE DES MINES DE SAINT-ETIENNE
Organization address
address: COURS FAURIEL contact info |
FR (SAINT ETIENNE CEDEX) | participant | 0.00 |
6 |
INFINEON TECHNOLOGIES AUSTRIA AG
Organization address
address: SIEMENSSTRASSE 2 contact info |
AT (VILLACH) | participant | 0.00 |
7 |
KATHOLIEKE UNIVERSITEIT LEUVEN
Organization address
address: Oude Markt contact info |
BE (LEUVEN) | participant | 0.00 |
8 |
MORPHO CARDS GMBH
Organization address
address: KONRAD ZUSE RING contact info |
DE (FLINTBEK) | participant | 0.00 |
Esplora la "nuvola delle parole (Word Cloud) per avere un'idea di massima del progetto.
The security of modern ICT (Information and Communication Technologies) systems relies fundamentally on the integrity of hardware components. This is the case for user identification and authentication as in smartcards, e-Id, e-Passports, e-health devices or for the integrity checking of computers and mobile systems as in trusted computing and TPMs. But it is also the case for telecommunication infrastructure as e.g. for servers or routers to support cloud computing.nUnfortunately, attacks on hardware devices keep on improving. Physical attacks, giving access to internal information, side channel attacks, using passive observations of execution time, power consumption or electro-magnetic radiations, or fault injection attacks using power glitches, light, laser and electro-magnetic perturbations are 'proven' ways of retrieving secrets. Today security circuits are protected to a certain level against these attacks, but an absolute protection (Tamper resistance) is unrealistic and the need of extra barriers arises.nNew security challenges arise: counterfeiting of hardware components is dramatically increasing (some studies indicate from 5 to 20 % of counterfeited components on the market) and the threat of Trojans or hidden functions in Integrated Circuits is moving from theoretical to real.nThe HINT project addresses these new challenges by proposing the development of novel integrity technologies to guarantee that a system is a genuine, non-modified one including the hardware components. Innovative hardware authentication and integrity checking technologies, based on PUF (Physically Unclonable Functions) and on Physical measurements (Side Channel Analysis) will be developed to offer an extra security barrier based on paradigms complementary to cryptography. The approach is related to the Trusted Computing one, but the major difference is the addition of hardware authentication and hardware integrity checking features to the software integrity checking chain.