Abstract
In this paper we discuss memories with their basic protection mechanisms and the results of the evaluation of a modern high-density flash memory by an Information Technology Security Evaluation Facility (ITSEF). In a second part, we address the notion of Authenticated Flash and present some authentication methodologies used for existing Flash devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Alves, Tiago, Rudelic, J.: ARM Security Solutions and Intel Authenticated Flash. White Paper, 2007. http://www.arm.com/pdfs/Intel_ARM_Security_White_Paper.pdf
Bertoni, Guido: Secure Non-volatile Memory: Is it a New Trend for the Security of Embedded Systems? Presented at the LSEC & IMEC Security Forum 2007. http://www.lsec.be/upload_directories/documents/6STM_Securenonvolatiememory_Bertoni_Guido.pdf
Flash Memory Modules Add Security to Handsets. Electronicstalk, 2007. http://www.electronicstalk.com/news/ssi/ssi125.html
Handschuh, Helena and Trichina, Elena: Securing Flash Technology. In: Breveglieri, L., Gueron, S., Koren, I., Nacccache, D., Seifert, J.-P. (Eds) 4th Int. Workshop on Fault Diagnosis and Tolerance in Cryptography — FDTC 2007. IEEE CSP, 2007, p. 3–17.
Schellekens, Dries, Tuyls, Pim, Preneel, Bart: Embedded Trusted Computing with Authenticated Nonvolatile Memory. In: Lipp, P., Sadeghi, A.-R., and Kock, K.-M. (Eds): TRUST 2008, LNCS 4968, 2008, p.60–74.
Security Features for NOR Flash Memories. AT Microelectronics, 2005. http://www.st.com/flash
Steil, Michael: 17 Mistakes Microsoft Made in Xbox Security. Presented at the 22nd Chaos Communication Congress, Berlin, Germany, 2005. http://www.xbox-linux.org/wiki/17_Mistakes_Microsoft_Made_in-the_Xbox_Security_System
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2009 Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
Handschuh, H., Trichina, E. (2009). Securing Flash Technology: How Does It Look From Inside?. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2008 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9283-6_40
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9283-6_40
Publisher Name: Vieweg+Teubner
Print ISBN: 978-3-8348-0660-4
Online ISBN: 978-3-8348-9283-6
eBook Packages: Computer ScienceComputer Science (R0)