Academic articles
Practitioner articles
Working papers
Books
Book chapters
Case studies
Other publications
Subject(s)
Strategy and general management; Technology, R&D management
Keyword(s)
5G, technological sovereignty, Europe, cybersecurity, industrial policy
The challenges that the EU faces with 5G go beyond cyber and national security threats. For Europe, the rollout of the 5G infrastructure has become a geopolitical test on several levels. Will Europe be a shaper or taker of 5G technology and the new era of industrialization it promises to propel? How will it be able to control the security and reliability of such key digital infrastructures in the long-term? Eventually, how should EU member states manage their dependencies on foreign technologies and strengthen their âtechnological sovereigntyâ â a political priority of the incoming EU Commission led by Ursula von der Leyen? The latter might be the most important strategic issue the EU will need to tackle in the long-term and will be decisive for the Unionâs ability to shape its own future in the digital age.
Secondary Title
The convergence puzzle: Australia, Germany and emerging cybersecurity trends
Pages
35â40
Subject(s)
Health and environment; Information technology and systems
Keyword(s)
COVID-19, pandemic, cyberattacks, necessity, attribution, rule of law, international law, hospitals
Subject(s)
Information technology and systems
Keyword(s)
Applications, Physically Unclonable Function, machine learning, modelling attack
Physical Unclonable Functions (PUFs) and, in particular, XOR Arbiter PUFs have gained much research interest as an authentication mechanism for embedded systems. One of the biggest problems of (strong) PUFs is their vulnerability to so called machine learning attacks. In this paper we take a closer look at one aspect of machine learning attacks that has not yet gained the needed attention: the generation of the sub-challenges in XOR Arbiter PUFs fed to the individual Arbiter PUFs. Specifically, we look at one of the most popular ways to generate sub-challenges based on a combination of permutations and XORs as it has been described for the "Lightweight Secure PUF". Previous research suggested that using such a sub-challenge generation increases the machine learning resistance significantly.
Our contribution in the field of sub-challenge generation is three-fold: First, drastically improving attack results by RĂŒhrmair et al., we describe a novel attack that can break the Lightweight Secure PUF in time roughly equivalent to an XOR Arbiter PUF without transformation of the challenge input. Second, we give a mathematical model that gives insight into the weakness of the Lightweight Secure PUF and provides a way to study generation of sub-challenges in general. Third, we propose a new, efficient, and cost-effective way for sub-challenge generation that mitigates the attack strategy we used and outperforms the Lightweight Secure PUF in both machine learning resistance and resource overhead.
Our contribution in the field of sub-challenge generation is three-fold: First, drastically improving attack results by RĂŒhrmair et al., we describe a novel attack that can break the Lightweight Secure PUF in time roughly equivalent to an XOR Arbiter PUF without transformation of the challenge input. Second, we give a mathematical model that gives insight into the weakness of the Lightweight Secure PUF and provides a way to study generation of sub-challenges in general. Third, we propose a new, efficient, and cost-effective way for sub-challenge generation that mitigates the attack strategy we used and outperforms the Lightweight Secure PUF in both machine learning resistance and resource overhead.
Volume
11833
ISBN
978-3-030-42068-0
Journal Pages
40â54
Subject(s)
Strategy and general management; Technology, R&D management
Keyword(s)
Learning-by-hiring, inter-firm mobility, innovation, patents
ISSN (Print)
0015-6914
Subject(s)
Economics, politics and business environment; Information technology and systems; Technology, R&D management
Keyword(s)
IT-Security, Digital Sovereignty, Industrial policy
The public hearing of the Digital Agenda Committee on the topic of "IT security of hardware and software as a precondition for digital sovereignty" on Wednesday, December 11, 2019, analyzed how citizens, companies, but also public administration organizations in Germany are positioned with regard to digital sovereignty . The Committee led by Hansjörg Durz (CDU/CSU) focused primarily on the current state of Germany's IT infrastructure and governance, the need for legislative action, and security gaps.
In her statement, Isabel Skierka gives an assessment of Germany's industrial policy position in the field of digital technologies and the IT security situation and recommendations for strengthening digital sovereignty and IT security at the national and European level.
[Wie die BĂŒrger, Unternehmen, aber auch die Verwaltung in Deutschland hinsichtlich der digitalen SouverĂ€nitĂ€t aufgestellt sind, dazu gaben die SachverstĂ€ndigen bei einer öffentlichen Anhörung des Ausschusses Digitale Agenda zum Thema âIT-Sicherheit von Hard- und Software als Voraussetzung fĂŒr Digitale SouverĂ€nitĂ€tâ am Mittwoch, 11. Dezember 2019, unterschiedliche EinschĂ€tzungen ab. Bei der Expertenbefragung unter Leitung von Hansjörg Durz (CDU/CSU) ging es vor allem um den Ist-Zustand der IT-Struktur Deutschlands, gesetzgeberischen Handlungsbedarf und SicherheitslĂŒcken.
In ihrer Stellungnahme gibt Isabel Skierka eine EinschšÀtzung zur industriepolitischen Stellung Deutschlands im Bereich digitaler Technologien sowie der IT-Sicherheitslage und Empfehlungen fĂŒr die StĂ€rkung digitaler SouverĂ€nitĂ€t und der IT-Sicherheit auf nationaler und europĂ€ischer Ebene.]
In her statement, Isabel Skierka gives an assessment of Germany's industrial policy position in the field of digital technologies and the IT security situation and recommendations for strengthening digital sovereignty and IT security at the national and European level.
[Wie die BĂŒrger, Unternehmen, aber auch die Verwaltung in Deutschland hinsichtlich der digitalen SouverĂ€nitĂ€t aufgestellt sind, dazu gaben die SachverstĂ€ndigen bei einer öffentlichen Anhörung des Ausschusses Digitale Agenda zum Thema âIT-Sicherheit von Hard- und Software als Voraussetzung fĂŒr Digitale SouverĂ€nitĂ€tâ am Mittwoch, 11. Dezember 2019, unterschiedliche EinschĂ€tzungen ab. Bei der Expertenbefragung unter Leitung von Hansjörg Durz (CDU/CSU) ging es vor allem um den Ist-Zustand der IT-Struktur Deutschlands, gesetzgeberischen Handlungsbedarf und SicherheitslĂŒcken.
In ihrer Stellungnahme gibt Isabel Skierka eine EinschšÀtzung zur industriepolitischen Stellung Deutschlands im Bereich digitaler Technologien sowie der IT-Sicherheitslage und Empfehlungen fĂŒr die StĂ€rkung digitaler SouverĂ€nitĂ€t und der IT-Sicherheit auf nationaler und europĂ€ischer Ebene.]
Subject(s)
Strategy and general management
Keyword(s)
Luck, music industry, business, success, S&P 500
Subject(s)
Information technology and systems
Keyword(s)
international law, cybersecurity, cyberattacks, evidence, self-defence, countermeasures, mistake of fact
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
Cybersecurity, digital strategy
Volume
16
Journal Pages
36â38
Subject(s)
Human resources management/organizational behavior; Strategy and general management
ISSN (Print)
0015-6914
Subject(s)
Economics, politics and business environment; Information technology and systems; Technology, R&D management
Keyword(s)
cybersecurity, digital sovereignty
Cybersicherheit ist fĂŒr Europa zu einer SchlĂŒsselfrage der globalen digitalen Transformation geworden. Mit dem Cybersecurity Act, also der Cybersicherheitsverordnung, hat die EU einen rechtlichen Rahmen mit dem Anspruch globaler Ausstrahlung vorgelegt. Eingebettet in eine Politik, die digitale SouverĂ€nitĂ€t mit strategischer Verflechtung kombiniert, kann die Verordnung das Tor zu einem dritten Weg Europas im Cyberraum sein, der zwischen dem US-amerikanischen Modell der Marktfreiheit und dem chinesischen Modell des autori- tĂ€ren Staatskapitalismus verlĂ€uft. Der Cybersecurity Act wird verbindlicher Handlungsrahmen und RĂŒckenwind fĂŒr die bundesdeutsche Cybersicherheitspolitik sein.
Pages
7