Truspy: Cache side-channel information leakage from the secure world on arm devices
As smart, embedded devices are increasingly integrated into our daily life, the security of
these devices has become a major concern. The ARM processor family, which powers more …
these devices has become a major concern. The ARM processor family, which powers more …
Secure bit: Transparent, hardware buffer-overflow protection
K Piromsopa, RJ Enbody - IEEE Transactions on Dependable …, 2006 - ieeexplore.ieee.org
We propose a minimalist, architectural approach, Secure Bit (patent pending), to protect
against buffer overflow attacks on control data (return-address and function-pointer attacks …
against buffer overflow attacks on control data (return-address and function-pointer attacks …
The internet of things: security challenges
PC Van Oorschot, SW Smith - IEEE Security & Privacy, 2019 - ieeexplore.ieee.org
The five articles in this special section focus on Internet of Things (IoT) security and privacy
issues. IoT involves embedding, at massive scale, processor-based systems into physical …
issues. IoT involves embedding, at massive scale, processor-based systems into physical …
Internet-of-things security and vulnerabilities: Taxonomy, challenges, and practice
Recent years have seen rapid development and deployment of Internet-of-Things (IoT)
applications in a diversity of application domains. This has resulted in creation of new …
applications in a diversity of application domains. This has resulted in creation of new …
Microguard: Securing bare-metal microcontrollers against code-reuse attacks
Bare-metal microcontrollers are a family of Internet of Things (IoT) devices which are
increasingly deployed in critical industrial environments. Similar to other IoT devices, bare …
increasingly deployed in critical industrial environments. Similar to other IoT devices, bare …
Cyber-physical systems security: a systematic mapping study
Cyber-physical systems are integrations of computation, networking, and physical
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
Cipherfix: Mitigating Ciphertext {Side-Channel} Attacks in Software
Trusted execution environments (TEEs) provide an environment for running workloads in the
cloud without having to trust cloud service providers, by offering additional hardware …
cloud without having to trust cloud service providers, by offering additional hardware …
A comprehensive survey on security in cloud computing
According to a Forbes' report published in 2015, cloud-based security spending is expected
to increase by 42%. According to another research, the IT security expenditure had …
to increase by 42%. According to another research, the IT security expenditure had …
Edge computing security: State of the art and challenges
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …
years have been dramatically incentivizing the advancement of edge computing. On the one …
Breaking trustzone memory isolation through malicious hardware on a modern fpga-soc
FPGA-SoCs are heterogeneous computing systems consisting of reconfigurable hardware
and high performance processing units. This combination enables a flexible design …
and high performance processing units. This combination enables a flexible design …