loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Sylvain Guilley 1 ; 2 ; 3 ; Michel Le Rolland 4 and Damien Quenson 4

Affiliations: 1 École Normale Supérieure, 45 rue d’Ulm, Département d’informatique, CNRS, PSL University, 75005 Paris, France ; 2 Secure-IC S.A.S., Tour Montparnasse, 27th floor, 75015 Paris, France ; 3 TELECOM-Paris, Institut Polytechnique de Paris, 19 Place Marguerite Perey, 91120 Palaiseau, France ; 4 Secure-IC S.A.S. Headquarters, 15 rue Claude Chappe, Bât. B, 35510 Cesson-Sévigné, France

Keyword(s): Integrated Secure Element, Host Protection, Certification Schemes, Security Flexibility, Internet of Things.

Abstract: More and more networked applications require security, with keys managed at the end-point. However, traditional Secure Elements have not been designed to be connected. There is thus a need to bridge the gap, and novel kinds of Secure Elements have been introduced in this respect. Connectivity has made it possible for a single chip to implement multiple usages. For instance, in a smart- phone, security is about preventing the device from being rooted, but also about enabling user’s online privacy. Therefore, Secure Elements shall be compatible with multiple requirements for various vertical markets (e.g., payment, contents protection, automotive, etc.). The solution to this versatility is the integration of the Secure Element within the device main chip. Such approach, termed iSE (integrated Secure Element), consists in the implementation of a subsystem, endowed to manage the chip security, within a host System-on-Chip. The iSE offers flexibility in the security deployment. However, n atural questions that arise are: how to program security applications using an iSE? How to certify those applications, most likely according to several different schemes? This position paper addresses those questions, and comes up with some key concepts of on-chip security, in terms of iSE secure usage. In particular, we will show in this paper that iSE nowadays shall be designed so that the product it embeds is certifiable in a multiplicity of schemes, and so even before the product is launched on the market. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.239.185.22

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Guilley, S.; Rolland, M. and Quenson, D. (2021). Implementing Secure Applications Thanks to an Integrated Secure Element. In Proceedings of the 7th International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-491-6; ISSN 2184-4356, SciTePress, pages 566-571. DOI: 10.5220/0010298205660571

@conference{icissp21,
author={Sylvain Guilley. and Michel Le Rolland. and Damien Quenson.},
title={Implementing Secure Applications Thanks to an Integrated Secure Element},
booktitle={Proceedings of the 7th International Conference on Information Systems Security and Privacy - ICISSP},
year={2021},
pages={566-571},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010298205660571},
isbn={978-989-758-491-6},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 7th International Conference on Information Systems Security and Privacy - ICISSP
TI - Implementing Secure Applications Thanks to an Integrated Secure Element
SN - 978-989-758-491-6
IS - 2184-4356
AU - Guilley, S.
AU - Rolland, M.
AU - Quenson, D.
PY - 2021
SP - 566
EP - 571
DO - 10.5220/0010298205660571
PB - SciTePress