RESCURE: Retrofit security for critical infrastructures

Mario Münzer, Stefan Ilic, Georgios Selimis, Rui Wang, Frans M.J. Willems, C.J. (Lieneke) Kusters

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review


Low-cost interconnected devices, so-called Internet-of-Things (IoT), commonly have no dedicated or posses insufficient hardware security features. This is challenging, as IoT devices are becoming an integral part of critical infrastructures providing much needed additional functionality but also creating a significant security threat to the infrastructure. Due to the scale of IoT integration in critical infrastructures, a key issue in initial deployment and replacing of the devices is often the cost. RESCURE delivers a low-cost IoT security solution based on unique hardware anchors. More precisely, we are using PUFs (Physical Unclonable Function) technology based on SRAM (Static Random-Access Memory), which provides a unique and unclonable identifier as well as a root key for each device. As SRAM-PUFs-based approaches require no additional specialized hardware, it also presents a viable approach of retrofitting existing embedded devices already used.
Original languageEnglish
Title of host publicationWiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Place of PublicationNew York
PublisherAssociation for Computing Machinery, Inc
Number of pages3
ISBN (Electronic)9781450380065
ISBN (Print)978-1-4503-8006-5
Publication statusPublished - 8 Jul 2020
Event13th ACM Conference on Security and Privacy in Wireless and Mobile Networks - VIRTUAL, Linz, Austria
Duration: 8 Jul 202010 Jul 2020


Conference13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Abbreviated titleACM WiSec 2020


  • embedded systems security
  • end-to-end encryption
  • internet-of-things
  • multiple observations
  • physically unclonable function


Dive into the research topics of 'RESCURE: Retrofit security for critical infrastructures'. Together they form a unique fingerprint.

Cite this