Realswatt: Remote software-based attestation for embedded devices under realtime constraints
Smart factories, critical infrastructures, and medical devices largely rely on embedded
systems that need to satisfy realtime constraints to complete crucial tasks. Recent studies …
systems that need to satisfy realtime constraints to complete crucial tasks. Recent studies …
Remote attestation: A literature review
With the rising number of IoT devices, the security of such devices becomes increasingly
important. Remote attestation (RA) is a distinct security service that allows a remote verifer to …
important. Remote attestation (RA) is a distinct security service that allows a remote verifer to …
[HTML][HTML] State-of-the-art software-based remote attestation: Opportunities and open issues for Internet of Things
The Internet of Things (IoT) ecosystem comprises billions of heterogeneous Internet-
connected devices which are revolutionizing many domains, such as healthcare …
connected devices which are revolutionizing many domains, such as healthcare …
Scapi: a scalable attestation protocol to detect software and physical attacks
Interconnected embedded devices are increasingly used in various scenarios, including
industrial control, building automation, or emergency communication. As these systems …
industrial control, building automation, or emergency communication. As these systems …
slimiot: Scalable lightweight attestation protocol for the internet of things
The Internet of Things (IoT) is increasingly intertwined with critical industrial processes, yet
contemporary IoT devices offer limited security features, creating a large new attack surface …
contemporary IoT devices offer limited security features, creating a large new attack surface …
Simple: A remote attestation approach for resource-constrained iot devices
Remote Attestation (RA) is a security service that detects malware presence on remote IoT
devices by verifying their software integrity by a trusted party (verifier). There are three main …
devices by verifying their software integrity by a trusted party (verifier). There are three main …
Hardware-assisted remote runtime attestation for critical embedded systems
M Geden, K Rasmussen - … on Privacy, Security and Trust (PST), 2019 - ieeexplore.ieee.org
Remote attestation, as a challenge-response protocol, enables a trusted entity, called
verifier, to ask for an untrusted device, called prover, to provide assurance about its internal …
verifier, to ask for an untrusted device, called prover, to provide assurance about its internal …
LIRA-V: Lightweight remote attestation for constrained RISC-V devices
C Shepherd, K Markantonakis… - 2021 IEEE Security and …, 2021 - ieeexplore.ieee.org
This paper presents LIRA-V, a lightweight system for performing remote attestation between
constrained devices using the RISC-V architecture. We propose using read-only memory …
constrained devices using the RISC-V architecture. We propose using read-only memory …
Litehax: lightweight hardware-assisted attestation of program execution
G Dessouky, T Abera, A Ibrahim… - 2018 IEEE/ACM …, 2018 - ieeexplore.ieee.org
Unlike traditional processors, embedded Internet of Things (IoT) devices lack resources to
incorporate protection against modern sophisticated attacks resulting in critical …
incorporate protection against modern sophisticated attacks resulting in critical …
A practical attestation protocol for autonomous embedded systems
F Kohnhäuser, N Büscher… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
With the recent advent of the Internet of Things (IoT), embedded devices increasingly
operate collaboratively in autonomous networks. A key technique to guard the secure and …
operate collaboratively in autonomous networks. A key technique to guard the secure and …