March 31, 2023, 1:10 a.m. | Shashank Tripathi, Volker Skwarek

cs.CR updates on arXiv.org arxiv.org

With the rising numbers for IoT objects, it is becoming easier to penetrate
counterfeit objects into the mainstream market by adversaries. Such
infiltration of bogus products can be addressed with third-party-verifiable
identification. Generally, state-of-the-art identification schemes do not
guarantee that an identifier e.g. barcodes or RFID itself cannot be forged.
This paper introduces identification patterns representing the objects
intrinsic identity by robust hashes and not only by generated identification
patterns. Inspired by these two notions, a collection of uniquely identifiable …

advanced adversaries art attributes bogus called collection counterfeit digital generated guarantee hashes identification identity iot market numbers party patterns physical products rfid rising state third third-party

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cloud Technical Solutions Engineer, Security

@ Google | Mexico City, CDMX, Mexico

Assoc Eng Equipment Engineering

@ GlobalFoundries | SGP - Woodlands

Staff Security Engineer, Cloud Infrastructure

@ Flexport | Bellevue, WA; San Francisco, CA

Software Engineer III, Google Cloud Security and Privacy

@ Google | Sunnyvale, CA, USA

Software Engineering Manager II, Infrastructure, Google Cloud Security and Privacy

@ Google | San Francisco, CA, USA; Sunnyvale, CA, USA