Inspired by these developments, this paper explores a different approach that relies neither on secure hardware nor on tight timing constraints. By taking advantage of the bounded memory/storage model of low-cost embedded devices and assuming a small amount of read-only memory (ROM), our uses a new primitive -- Proofs of Secure Erasure (PoSE-s). We show that, even though our PoSE-based approach is effective and provably secure, it is not cheap. However, it is particularly well-suited and practical for two other related tasks: secure code update and secure memory/storage erasure. We consider several flavors of PoSE-based protocols and demonstrate their feasibility in the context of existing commodity embedded devices.
Category / Keywords: applications / smart cards Date: received 19 Apr 2010, last revised 30 Jul 2010 Contact author: perito at inrialpes fr Available formats: PDF | BibTeX Citation Version: 20100730:174315 (All versions of this report) Discussion forum: Show discussion | Start new discussion