Detecting compromised IoT devices: Existing techniques, challenges, and a way forward
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
Collective remote attestation at the Internet of Things scale: State-of-the-art and future challenges
In recent years, the booming of Internet of Things (IoT) has populated the world with billions
of smart devices that implement novel services and applications. The potential for …
of smart devices that implement novel services and applications. The potential for …
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially
considering the fact that 5G technology facilitates numerous services building on IoT …
considering the fact that 5G technology facilitates numerous services building on IoT …
A PUF-based modeling-attack resilient authentication protocol for IoT devices
M Ebrahimabadi, M Younis… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) offer a promising solution for the authentication of
Internet of Things (IoT) devices as they provide unique fingerprints for the underlying …
Internet of Things (IoT) devices as they provide unique fingerprints for the underlying …
[PDF][PDF] RAI: Securing Embedded Systems with Return Address Integrity
NS Almakhdhub, AA Clements, S Bagchi… - Network and Distributed …, 2020 - par.nsf.gov
Embedded systems are deployed in security critical environments and have become a
prominent target for remote attacks. Microcontroller-based systems (MCUS) are particularly …
prominent target for remote attacks. Microcontroller-based systems (MCUS) are particularly …
On the TOCTOU problem in remote attestation
I De Oliveira Nunes, S Jakkamsetti… - Proceedings of the …, 2021 - dl.acm.org
Much attention has been devoted to verifying software integrity of remote embedded (IoT)
devices. Many techniques, with different assumptions and security guarantees, have been …
devices. Many techniques, with different assumptions and security guarantees, have been …
Simple: A remote attestation approach for resource-constrained iot devices
Remote Attestation (RA) is a security service that detects malware presence on remote IoT
devices by verifying their software integrity by a trusted party (verifier). There are three main …
devices by verifying their software integrity by a trusted party (verifier). There are three main …
[PDF][PDF] DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems.
Networks of autonomous collaborative embedded systems are emerging in many
application domains such as vehicular ad-hoc networks, robotic factory workers …
application domains such as vehicular ad-hoc networks, robotic factory workers …
Realswatt: Remote software-based attestation for embedded devices under realtime constraints
Smart factories, critical infrastructures, and medical devices largely rely on embedded
systems that need to satisfy realtime constraints to complete crucial tasks. Recent studies …
systems that need to satisfy realtime constraints to complete crucial tasks. Recent studies …
{ARI}: Attestation of Real-time Mission Execution Integrity
With the proliferation of autonomous safety-critical cyber-physical systems (CPS) in our daily
life, their security is becoming ever more important. Remote attestation is a powerful …
life, their security is becoming ever more important. Remote attestation is a powerful …