Detecting compromised IoT devices: Existing techniques, challenges, and a way forward

I Makhdoom, M Abolhasan, D Franklin, J Lipman… - Computers & …, 2023 - Elsevier
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …

Collective remote attestation at the Internet of Things scale: State-of-the-art and future challenges

M Ambrosin, M Conti, R Lazzeretti… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
In recent years, the booming of Internet of Things (IoT) has populated the world with billions
of smart devices that implement novel services and applications. The potential for …

A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects

B Kuang, A Fu, W Susilo, S Yu, Y Gao - Computers & Security, 2022 - Elsevier
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially
considering the fact that 5G technology facilitates numerous services building on IoT …

A PUF-based modeling-attack resilient authentication protocol for IoT devices

M Ebrahimabadi, M Younis… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) offer a promising solution for the authentication of
Internet of Things (IoT) devices as they provide unique fingerprints for the underlying …

[PDF][PDF] RAI: Securing Embedded Systems with Return Address Integrity

NS Almakhdhub, AA Clements, S Bagchi… - Network and Distributed …, 2020 - par.nsf.gov
Embedded systems are deployed in security critical environments and have become a
prominent target for remote attacks. Microcontroller-based systems (MCUS) are particularly …

On the TOCTOU problem in remote attestation

I De Oliveira Nunes, S Jakkamsetti… - Proceedings of the …, 2021 - dl.acm.org
Much attention has been devoted to verifying software integrity of remote embedded (IoT)
devices. Many techniques, with different assumptions and security guarantees, have been …

Simple: A remote attestation approach for resource-constrained iot devices

M Ammar, B Crispo, G Tsudik - 2020 ACM/IEEE 11th …, 2020 - ieeexplore.ieee.org
Remote Attestation (RA) is a security service that detects malware presence on remote IoT
devices by verifying their software integrity by a trusted party (verifier). There are three main …

[PDF][PDF] DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems.

T Abera, R Bahmani, F Brasser, A Ibrahim… - NDSS, 2019 - ndss-symposium.org
Networks of autonomous collaborative embedded systems are emerging in many
application domains such as vehicular ad-hoc networks, robotic factory workers …

Realswatt: Remote software-based attestation for embedded devices under realtime constraints

S Surminski, C Niesler, F Brasser, L Davi… - Proceedings of the …, 2021 - dl.acm.org
Smart factories, critical infrastructures, and medical devices largely rely on embedded
systems that need to satisfy realtime constraints to complete crucial tasks. Recent studies …

{ARI}: Attestation of Real-time Mission Execution Integrity

J Wang, Y Wang, A Li, Y Xiao, R Zhang, W Lou… - 32nd USENIX Security …, 2023 - usenix.org
With the proliferation of autonomous safety-critical cyber-physical systems (CPS) in our daily
life, their security is becoming ever more important. Remote attestation is a powerful …