Remote inspection of adversary-controlled environments.

Autor: Tobisch J; Max Planck Institute for Security and Privacy, Bochum, Germany. johannes.tobisch@mpi-sp.org., Philippe S; Program on Science and Global Security, Princeton University, Princeton, NJ, USA. sebastien@princeton.edu., Barak B; John A. Paulson School of Engineering and Applied Sciences, Harvard University, Boston, MA, USA., Kaplun G; John A. Paulson School of Engineering and Applied Sciences, Harvard University, Boston, MA, USA., Zenger C; PHYSEC GmbH, Bochum, Germany.; Secure Mobile Networking, Ruhr University Bochum, Bochum, Germany., Glaser A; Program on Science and Global Security, Princeton University, Princeton, NJ, USA., Paar C; Max Planck Institute for Security and Privacy, Bochum, Germany., Rührmair U; Electrical Engineering and Computer Science Department, TU Berlin, Berlin, Germany. ruehrmair@ilo.de.; Secure Computation Laboratory, University of Connecticut, Storrs, Mansfield, CT, USA. ruehrmair@ilo.de.
Jazyk: angličtina
Zdroj: Nature communications [Nat Commun] 2023 Oct 17; Vol. 14 (1), pp. 6566. Date of Electronic Publication: 2023 Oct 17.
DOI: 10.1038/s41467-023-42314-2
Abstrakt: Remotely monitoring the location and enduring presence of valuable items in adversary-controlled environments presents significant challenges. In this article, we demonstrate a monitoring approach that leverages the gigahertz radio-wave scattering and absorption of a room and its contents, including a set of mirrors with random orientations placed inside, to remotely verify the absence of any disturbance over time. Our technique extends to large physical systems the application of physical unclonable functions for integrity protection. Its main applications are scenarios where parties are mutually distrustful and have privacy and security constraints. Examples range from the verification of nuclear arms-control treaties to the securing of currency, artwork, or data centers.
(© 2023. Springer Nature Limited.)
Databáze: MEDLINE