篡改检测
概述
篡改检测技术使设备能够检测并启动适当的防御措施,以防止主动尝试破坏设备完整性或与设备相关的数据。根据预期的威胁和风险,可以实施篡改检测设计来感知不同类型的篡改。用于篡改检测的解决方案通常包括一套专门针对单一威胁类型的传感器以及一个警报机制,该机制可以听得见或发送到监控系统。典型的威胁类型包括物理穿透、极端高温或低温、输入电压变化、输入频率变化和 X 射线。
适用行业
- 汽车
- 运输
适用功能
- 维护
- 物流仓储
案例研究.
Case Study
Secure and Cloud-based Data Marketplace
The great promise of new connected concepts of industry like 'Industry 4.0' is their ability to deliver a historically unparalleled level of responsiveness and flexibility. While modern supply chains are already heavily integrated and designed to be fluid and fast moving, a large swathe of manufacturing still remains beholden to economies of scale, large production runs, and careful preplanning.The Industrial Internet of Things (IIoT) is set to change this by allowing small-batch or even custom manufacturing on a truly industrial scale. With machines whose functions are not set in stone, but flexible and determined by their operating software and with a new form of connectivity bringing industrial engineers, product manufacturers, and end users closer together than ever before. Ad-hoc adjustments to automotive parts, for example, during active product runs or the bespoke manufacturing of custom sneakers become very viable options indeed.Much of this remains a theoretical vision, but IUNO, the German national reference project for IT security in Industry 4.0 demonstrates the new capabilities in action with a secure technology data marketplace running a smart drinks mixer.
Case Study
Precision Wearable Biometrics Provider, Valencell, Selects Arxan to Protect Intellectual Property
Years of research and development were invested by the company into their biometric sensor technology. They wanted to ensure that their unique, patented intellectual property (IP) was not compromised or cloned through application attacks, such as reverse-engineering or code tampering. This was particularly important given the increased competitive pressures in the wearables market and the customer’s distribution model of working in partnership with consumer product manufacturers and potentially third party developers. Although patented and protected under NDA, the company’s code and IP could potentially be exposed during the sharing of their technology (in the form of an SDK/library) during integration as partners work to turn their wearable products into biometric wearables. The customer also required ease of use and flexibility such that their proprietary technology could first be easily protected and then be leveraged within another 3rd party application. As such, the solution needed to meet stringent resource consumption requirements of diverse mobile / IoT platforms.