A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives

M Hossain, G Kayas, R Hasan, A Skjellum, S Noor… - Future Internet, 2024 - mdpi.com
Driven by the rapid escalation of its utilization, as well as ramping commercialization,
Internet of Things (IoT) devices increasingly face security threats. Apart from denial of …

Hardware-assisted run-time monitoring for secure program execution on embedded processors

D Arora, S Ravi, A Raghunathan… - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
Embedded system security is often compromised when" trusted" software is subverted to
result in unintended behavior, such as leakage of sensitive data or execution of malicious …

Property-based TPM virtualization

AR Sadeghi, C Stüble, M Winandy - International Conference on …, 2008 - Springer
Today, virtualization technologies and hypervisors celebrate their rediscovery. Especially
migration of virtual machines (VMs) between hardware platforms provides a useful and cost …

Delay-based circuit authentication and applications

B Gassend, D Clarke, M Van Dijk… - Proceedings of the 2003 …, 2003 - dl.acm.org
We describe a technique to reliably identify individual integrated circuits (ICs), based on a
prior delay characterization of the IC. We describe a circuit architecture for a key card for …

Practical server privacy with secure coprocessors

SW Smith, D Safford - IBM Systems Journal, 2001 - ieeexplore.ieee.org
What does it take to implement a server that provides access to records in a large database,
in a way that ensures that this access is completely private—even to the operator of this …

Using intel software guard extensions for efficient two-party secure function evaluation

D Gupta, B Mood, J Feigenbaum, K Butler… - … Cryptography and Data …, 2016 - Springer
Recent developments have made two-party secure function evaluation (2P-SFE) vastly more
efficient. However, because they make extensive use of cryptographic operations, these …

Using a high-performance, programmable secure coprocessor

SW Smith, ER Palmer, S Weingart - … , FC'98 Anguilla, British West Indies …, 1998 - Springer
Unsecure computational environments threaten many financial cryptography
implementations, and other sensitive computation. High-performance secure coprocessors …

Emerging frontiers in embedded security

MM Kermani, M Zhang… - … conference on VLSI …, 2013 - ieeexplore.ieee.org
Computing platforms are expected to be deeply embedded within physical objects and
people, creating an Internet of Things. These embedded computing platforms will enable a …

Two-stage data encryption using chaotic neural networks

G Srivastava, CNS Vinoth Kumar… - Journal of Intelligent …, 2020 - content.iospress.com
Securing a wireless sensor system is a hard task for researchers today. Strengthening the
authentication system before connection establishment is the right way to enhance the …

Secure processors part I: background, taxonomy for secure enclaves and Intel SGX architecture

V Costan, I Lebedev, S Devadas - Foundations and Trends® …, 2017 - nowpublishers.com
This manuscript is the first in a two part survey and analysis of the state of the art in secure
processor systems, with a specific focus on remote software attestation and software …