Security implications of non-digital components

Access Full Text

Security implications of non-digital components

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Frontiers in Hardware Security and Trust; Theory, design and practice — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Author(s): Xiaoxi Ren 1 ; Zhe Zhou 2 ; Di Tang 3 ; Kehuan Zhang 3
View affiliations
Source: Frontiers in Hardware Security and Trust; Theory, design and practice,2020
Publication date November 2020

In this chapter, we will present two case studies that have utilized the feature of non-digital components to improve the security of a given system. We hope these works can inspire more following up works toward this direction and deepen our understandings over the security implications of non-digital components in computing systems.

Chapter Contents:

  • 10.1 Introduction
  • 10.2 Case study 1: Face Flashing—using light reflections to secure liveness detections
  • 10.2.1 Architecture of face authentication systems
  • 10.2.2 Attacks and solutions on liveness detection
  • 10.2.3 Design of Face Flashing protocol
  • 10.2.4 Key techniques
  • 10.2.4.1 Model of light reflection
  • 10.2.4.2 Face extraction
  • 10.2.4.3 Timing verification
  • 10.2.4.4 Face verification
  • 10.2.5 Security analysis
  • 10.2.5.1 Challenge–response elements
  • 10.2.5.2 Security of timing verification
  • 10.2.5.3 Security of face verification
  • 10.2.5.4 Security against typical attacks
  • 10.3 Case study 2: Secure mobile payment via imperfection of LCD screens
  • 10.3.1 Physical feature of screens
  • 10.3.2 Off-line QR payment
  • 10.3.3 Adversary model
  • 10.3.4 Generate screen fingerprint using brightness unevenness
  • 10.3.4.1 Photo extraction and correction
  • 10.3.4.2 Fingerprint extraction and comparison
  • 10.3.5 Extension: anonymous screen authentication
  • 10.3.5.1 Framework overview
  • 10.3.5.2 Screen obfuscation
  • 10.3.5.3 AnonPrint verification
  • 10.4 Conclusion
  • References

Inspec keywords: security of data

Other keywords: nondigital components; security implications; computing systems

Subjects: Data security; Security aspects of hardware

Preview this chapter:
Zoom in
Zoomout

Security implications of non-digital components, Page 1 of 2

| /docserver/preview/fulltext/books/cs/pbcs066e/PBCS066E_ch10-1.gif /docserver/preview/fulltext/books/cs/pbcs066e/PBCS066E_ch10-2.gif

Related content

content/books/10.1049/pbcs066e_ch10
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading