A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives
Driven by the rapid escalation of its utilization, as well as ramping commercialization,
Internet of Things (IoT) devices increasingly face security threats. Apart from denial of …
Internet of Things (IoT) devices increasingly face security threats. Apart from denial of …
Hardware-assisted run-time monitoring for secure program execution on embedded processors
D Arora, S Ravi, A Raghunathan… - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
Embedded system security is often compromised when" trusted" software is subverted to
result in unintended behavior, such as leakage of sensitive data or execution of malicious …
result in unintended behavior, such as leakage of sensitive data or execution of malicious …
Property-based TPM virtualization
AR Sadeghi, C Stüble, M Winandy - International Conference on …, 2008 - Springer
Today, virtualization technologies and hypervisors celebrate their rediscovery. Especially
migration of virtual machines (VMs) between hardware platforms provides a useful and cost …
migration of virtual machines (VMs) between hardware platforms provides a useful and cost …
Delay-based circuit authentication and applications
We describe a technique to reliably identify individual integrated circuits (ICs), based on a
prior delay characterization of the IC. We describe a circuit architecture for a key card for …
prior delay characterization of the IC. We describe a circuit architecture for a key card for …
Practical server privacy with secure coprocessors
SW Smith, D Safford - IBM Systems Journal, 2001 - ieeexplore.ieee.org
What does it take to implement a server that provides access to records in a large database,
in a way that ensures that this access is completely private—even to the operator of this …
in a way that ensures that this access is completely private—even to the operator of this …
Using intel software guard extensions for efficient two-party secure function evaluation
Recent developments have made two-party secure function evaluation (2P-SFE) vastly more
efficient. However, because they make extensive use of cryptographic operations, these …
efficient. However, because they make extensive use of cryptographic operations, these …
Using a high-performance, programmable secure coprocessor
Unsecure computational environments threaten many financial cryptography
implementations, and other sensitive computation. High-performance secure coprocessors …
implementations, and other sensitive computation. High-performance secure coprocessors …
Emerging frontiers in embedded security
MM Kermani, M Zhang… - … conference on VLSI …, 2013 - ieeexplore.ieee.org
Computing platforms are expected to be deeply embedded within physical objects and
people, creating an Internet of Things. These embedded computing platforms will enable a …
people, creating an Internet of Things. These embedded computing platforms will enable a …
Two-stage data encryption using chaotic neural networks
G Srivastava, CNS Vinoth Kumar… - Journal of Intelligent …, 2020 - content.iospress.com
Securing a wireless sensor system is a hard task for researchers today. Strengthening the
authentication system before connection establishment is the right way to enhance the …
authentication system before connection establishment is the right way to enhance the …
Secure processors part I: background, taxonomy for secure enclaves and Intel SGX architecture
This manuscript is the first in a two part survey and analysis of the state of the art in secure
processor systems, with a specific focus on remote software attestation and software …
processor systems, with a specific focus on remote software attestation and software …