Service interruption on Monday 11 July from 12:30 to 13:00: all the sites of the CCSD (HAL, EpiSciences, SciencesConf, AureHAL) will be inaccessible (network hardware connection).
Abstract : Product counterfeit is a tremendous challenge for vendors in many areas. Particularly important is a prevention of product counterfeit where products like telecommunication devices interact with other systems and thus a malfunctioning of a single device can jeopardize the complete system. This can also deteriorate the reputation of the vendor. Furthermore, violation of intellectual properties can cause financial losses. Detection of product counterfeit can be based on tracking back each device to the production process of the vendor to ensure the product origin. Devices without a verified source can then be considered counterfeit with a high potential to be malicious or of low quality. Vendors already apply vendor-specific security technologies protecting the distribution. These often employ special hardware-based security mechanisms specifically designed for a particular range of products.This publication shows the usage of the already available Trusted Platform Module to allow for distribution channel protection and to leverage overall security by allowing the secure identification of a specific device. It also explains a few additional Trusted Platform Module functionalities that can be used.
https://hal.inria.fr/hal-01345154 Contributor : Hal IfipConnect in order to contact the contributor Submitted on : Wednesday, July 13, 2016 - 3:09:41 PM Last modification on : Tuesday, October 19, 2021 - 12:49:45 PM
Nicolai Kuntze, Carsten Rudolph. On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios. 30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.630-644, ⟨10.1007/978-3-319-18467-8_42⟩. ⟨hal-01345154⟩