Protecting actuators in safety-critical IoT systems from control spoofing attacks
In this paper, we propose a framework called Contego-TEE to secure Internet-of-Things (IoT)
edge devices with timing requirements from control spoofing attacks where an adversary …
edge devices with timing requirements from control spoofing attacks where an adversary …
OAT: Attesting operation integrity of embedded devices
Due to the wide adoption of IoT/CPS systems, embedded devices (IoT frontends) become
increasingly connected and mission-critical, which in turn has attracted advanced attacks …
increasingly connected and mission-critical, which in turn has attracted advanced attacks …
[PDF][PDF] Silent Sabotage: A Stealthy Control Logic Injection in IIoT Systems
W Alsabbagh, C Kim… - Submitted at the 5th Silicon …, 2024 - researchgate.net
As Industrial Internet of Things (IIoT) continues to revolutionize industrial processes, the
security of these systems becomes paramount. This work contributes to ongoing efforts to …
security of these systems becomes paramount. This work contributes to ongoing efforts to …
Counteracting software integrity attacks on IoT devices with remote attestation: a prototype
DG Berbecaru, S Sisinni - 2022 26th International Conference …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) devices are increasingly deployed nowadays in various security-
sensitive contexts, eg, inside homes or in critical infrastructures. The data they collect is of …
sensitive contexts, eg, inside homes or in critical infrastructures. The data they collect is of …
Volttack: Control IoT devices by manipulating power supply voltage
This paper analyzes the security of Internet of Things (IoT) devices from the perspective of
sensing and actuating. Particularly, we discover a vulnerability in power supply modules and …
sensing and actuating. Particularly, we discover a vulnerability in power supply modules and …
Network-level security for the Internet of Things: Opportunities and challenges
Smart environments with many Internet of Things (IoT) devices are at significant risk of
cyberattacks, putting private data and personal safety in danger. While IoT device …
cyberattacks, putting private data and personal safety in danger. While IoT device …
Securing IoT applications with OP-TEE from hardware level OS
A Nehal, P Ahlawat - 2019 3rd International conference on …, 2019 - ieeexplore.ieee.org
With ever increasing use of smart devices, and things connected to Internet the capabilities
of these devices is also increasing. From a fridge tweeting about its contents to a microwave …
of these devices is also increasing. From a fridge tweeting about its contents to a microwave …
Smart I/O modules for mitigating cyber-physical attacks on industrial control systems
Cyber-physical systems (CPSs) are implemented in many industrial and embedded control
applications. Where these systems are safety-critical, correct and safe behavior is of …
applications. Where these systems are safety-critical, correct and safe behavior is of …
IIoTEED: An enhanced, trusted execution environment for industrial IoT edge devices
With the advent of the Internet of Things (IoT), security has emerged as a major design goal
for smart connected devices. This explosion in connectivity created a larger attack surface …
for smart connected devices. This explosion in connectivity created a larger attack surface …
IoT security attacks using reverse engineering methods on WSN applications
M Tellez, S El-Tawab… - 2016 IEEE 3rd World …, 2016 - ieeexplore.ieee.org
With the rapid technological advancements of sensors, Wireless Sensor Networks (WSNs)
have become a popular technology for the Internet of Things (IoT). We investigated the …
have become a popular technology for the Internet of Things (IoT). We investigated the …