ISG Smart Card and IoT Security Centre

  • Home
  • Research
    • Funded Projects
    • Research Areas
  • Partners
    • Members
    • Founding Members
  • Education
    • PhD Opportunities
    • MSc Projects
    • Customised Courses
  • People
    • Staff
    • PhD Students
    • Guest Lecturers and Researchers
    • Undergraduate Research Opportunities (UROP) Students
  • Publications
    • Research Papers
    • Books
      • Supplementary Information
  • Events
    • Smart Card and IoT Security Centre Open Day 2019
    • Smart Card and IoT Security Centre Open Day 2017
    • Smart Card and IoT Security Centre Open Day 2015
  • News

Software and Hardware Binding

You are here:Home » Research » Research Areas » Software and Hardware Binding

In this research thread, we consider a very powerful adversary model that involves attacks that enable an attacker to bypass the tamper resistance of individual nodes in cyber-physical systems. The attacker can read the contents of different memories, and as a result, any protection based on the tamper resistance of the chip (e.g., stored cryptographic keys) will be rendered useless. We are proposing a model of different hardware intrinsic functions that will allow the binding of software to a specific hardware both for IP protection but also for protection against counterfeiting/reused/repackaged products. The proposal is currently implemented in FPGA platforms.

Latest News

  • Post-Doctoral Research Fellow in Mobile Phone Forensics
  • Keynote Talk
  • World Economic Forum
  • PhD Graduation
  • Patent and commercialization
Contact Us

Smart Card and IoT Security Centre
Information Security Group,
Royal Holloway, University London, Egham,
Surrey,
TW20 0EX, UK

maps and directions
back up
© Copyright 2025 ISG Smart Card and IoT Security Centre