product protection

1
FRAUNHOFER RESEARCH INSTITUTION FOR APPLIED AND INTEGRATED SECURITY AISEC AISEC PRODUCT PROTECTION PRODUCT PROTECTION PRODUCT PROTECTION PROBLEM STATEMENT PROBLEM STATEMENT Hard and software are Hard- and software are exposed to sophisticated exposed to sophisticated attacks attacks Results are reverse Results are reverse i i d d t engineering and product counterfeiting counterfeiting SOLUTION SOLUTION Technological protection Technological protection measures allow to prevent measures allow to prevent product piracy and to product piracy and to t t t t protect corporate assets AISEC OFFERINGS AISEC OFFERINGS P d t ifi it l ti Product specific security solutions D i f fi f b dd d Design of counterfeit-proof embedded systems h l i l h d d f Technological protect measures to hard- and software Technological protect measures to hard and software State of the art cryptographic methods State of the art cryptographic methods Modern laboratory for security analysis of hardware Modern laboratory for security analysis of hardware Verification of protection against product forgery Verification of protection against product forgery

Upload: fraunhofer-aisec

Post on 02-Jun-2015

279 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Product Protection

F R A U N H O F E R R E S E A R C H I N S T I T U T I O N F O R A P P L I E D A N D I N T E G R AT E D S E C U R I T Y A I S E CA I S E C

PRODUCT PROTECTIONPRODUCT PROTECTIONPRODUCT PROTECTION

PROBLEM STATEMENTPROBLEM STATEMENT

Hard and software areHard- and software are exposed to sophisticatedexposed to sophisticated attacksattacks

Results are reverseResults are reverse i i d d tengineering and product g g p

counterfeitingcounterfeiting

SOLUTIONSOLUTION

Technological protectionTechnological protection g pmeasures allow to preventmeasures allow to prevent product piracy and toproduct piracy and to

t t t tprotect corporate assetsp p

AISEC OFFERINGSAISEC OFFERINGS

P d t ifi it l tiProduct specific security solutionsp y

D i f f i f b dd dDesign of counterfeit-proof embedded systems g p y

h l i l h d d fTechnological protect measures to hard- and softwareTechnological protect measures to hard and software

State of the art cryptographic methodsState of the art cryptographic methods

Modern laboratory for security analysis of hardwareModern laboratory for security analysis of hardware

Verification of protection against product forgeryVerification of protection against product forgery