Feb. 14, 2022, 2:20 a.m. | Md Faizul Bari, Parv Agrawal, Baibhab Chatterjee, Shreyas Sen

cs.CR updates on arXiv.org arxiv.org

Due to the diverse and mobile nature of the deployment environment, smart
commodity devices are vulnerable to various attacks which can grant
unauthorized access to a rogue device in a large, connected network.
Traditional digital signature-based authentication methods are vulnerable to
key recovery attacks, CSRF, etc. To circumvent this, RF-PUF had been proposed
as a promising alternative that utilizes the inherent nonidealities of the
devices as physical signatures. RF-PUF offers a robust authentication method
that is resilient to key-hacking methods …

analysis iot physical physical security puf rf security

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Cyber Security Culture – Communication and Content Specialist

@ H&M Group | Stockholm, Sweden

Container Hardening, Sr. (Remote | Top Secret)

@ Rackner | San Antonio, TX

GRC and Information Security Analyst

@ Intertek | United States

Information Security Officer

@ Sopra Steria | Bristol, United Kingdom

Casual Area Security Officer South Down Area

@ TSS | County Down, United Kingdom