Reboot-oriented IoT: Life cycle management in trusted execution environment for disposable IoT devices

K Suzaki, A Tsukamoto, A Green… - Proceedings of the 36th …, 2020 - dl.acm.org
Many IoT devices are geographically distributed without human administrators, which are
maintained by a remote server to enforce security updates, ideally through machine-to …

Rescure: A security solution for iot life cycle

G Selimis, R Wang, R Maes, GJ Schrijen… - Proceedings of the 15th …, 2020 - dl.acm.org
We present RESCURE, a security solution built on software, which retrofits Internet of Things
(IoT) devices to secure ones. RESCURE exploits the entropy originating from the random …

Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes

Z Ling, H Yan, X Shao, J Luo, Y Xu, B Pearson… - Journal of Systems …, 2021 - Elsevier
With the extensive application of IoT techniques, IoT devices have become ubiquitous in
daily lives. Meanwhile, attacks against IoT devices have emerged to compromise IoT …

The lazarus effect: Healing compromised devices in the internet of small things

M Huber, S Hristozov, S Ott, V Sarafov… - Proceedings of the 15th …, 2020 - dl.acm.org
We live in a time when billions of IoT devices are being deployed and increasingly relied
upon. This makes ensuring their availability and recoverability in case of a compromise a …

SCIoT: A secure and scalable end-to-end management framework for IoT devices

M Ambrosin, M Conti, A Ibrahim, AR Sadeghi… - … on Research in …, 2018 - Springer
Abstract The Internet of Things (IoT) is connecting billions of smart devices. One of the
emerging challenges in the IoT scenario is how to efficiently and securely manage large …

Real-time and security requirements for Internet-of-Things operating systems

M Malenko, M Baunach - Internet der Dinge: Echtzeit 2016, 2016 - Springer
Abstract The Internet of Things (IoT) is a new emerging technology connecting an enormous
number of networked computing devices embedded into arbitrary “things” of our daily life …

3rdParTEE: Securing third-party IoT services using the trusted execution environment

J Jang, BB Kang - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Advancements in the Internet of Things (IoT) have resulted in the connection and
deployment of numerous smart and embedded devices. Although such devices enable …

An iot device-trusted remote attestation framework

KT Kim, JD Lim, JN Kim - 2022 24th International Conference …, 2022 - ieeexplore.ieee.org
Remote attestation allows the verifier to determine the level of trust for the system's health.
We propose a framework for verifying the trustworthiness of the IoT device using remote …

Persistence in linux-based iot malware

C Brierley, J Pont, B Arief, DJ Barnes… - Secure IT Systems: 25th …, 2021 - Springer
Abstract The Internet of Things (IoT) is a rapidly growing collection of “smart” devices
capable of communicating over the Internet. Being connected to the Internet brings new …

A TOCTOU attack on DICE attestation

S Hristozov, M Wettermann, M Huber - Proceedings of the Twelfth ACM …, 2022 - dl.acm.org
A major security challenge for modern IoT deployments is to ensure that the devices run
legitimate firmware free from malware. This challenge can be addressed through a security …