Reboot-oriented IoT: Life cycle management in trusted execution environment for disposable IoT devices
K Suzaki, A Tsukamoto, A Green… - Proceedings of the 36th …, 2020 - dl.acm.org
Many IoT devices are geographically distributed without human administrators, which are
maintained by a remote server to enforce security updates, ideally through machine-to …
maintained by a remote server to enforce security updates, ideally through machine-to …
Rescure: A security solution for iot life cycle
We present RESCURE, a security solution built on software, which retrofits Internet of Things
(IoT) devices to secure ones. RESCURE exploits the entropy originating from the random …
(IoT) devices to secure ones. RESCURE exploits the entropy originating from the random …
Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes
With the extensive application of IoT techniques, IoT devices have become ubiquitous in
daily lives. Meanwhile, attacks against IoT devices have emerged to compromise IoT …
daily lives. Meanwhile, attacks against IoT devices have emerged to compromise IoT …
The lazarus effect: Healing compromised devices in the internet of small things
We live in a time when billions of IoT devices are being deployed and increasingly relied
upon. This makes ensuring their availability and recoverability in case of a compromise a …
upon. This makes ensuring their availability and recoverability in case of a compromise a …
SCIoT: A secure and scalable end-to-end management framework for IoT devices
Abstract The Internet of Things (IoT) is connecting billions of smart devices. One of the
emerging challenges in the IoT scenario is how to efficiently and securely manage large …
emerging challenges in the IoT scenario is how to efficiently and securely manage large …
Real-time and security requirements for Internet-of-Things operating systems
M Malenko, M Baunach - Internet der Dinge: Echtzeit 2016, 2016 - Springer
Abstract The Internet of Things (IoT) is a new emerging technology connecting an enormous
number of networked computing devices embedded into arbitrary “things” of our daily life …
number of networked computing devices embedded into arbitrary “things” of our daily life …
3rdParTEE: Securing third-party IoT services using the trusted execution environment
Advancements in the Internet of Things (IoT) have resulted in the connection and
deployment of numerous smart and embedded devices. Although such devices enable …
deployment of numerous smart and embedded devices. Although such devices enable …
An iot device-trusted remote attestation framework
KT Kim, JD Lim, JN Kim - 2022 24th International Conference …, 2022 - ieeexplore.ieee.org
Remote attestation allows the verifier to determine the level of trust for the system's health.
We propose a framework for verifying the trustworthiness of the IoT device using remote …
We propose a framework for verifying the trustworthiness of the IoT device using remote …
Persistence in linux-based iot malware
Abstract The Internet of Things (IoT) is a rapidly growing collection of “smart” devices
capable of communicating over the Internet. Being connected to the Internet brings new …
capable of communicating over the Internet. Being connected to the Internet brings new …
A TOCTOU attack on DICE attestation
S Hristozov, M Wettermann, M Huber - Proceedings of the Twelfth ACM …, 2022 - dl.acm.org
A major security challenge for modern IoT deployments is to ensure that the devices run
legitimate firmware free from malware. This challenge can be addressed through a security …
legitimate firmware free from malware. This challenge can be addressed through a security …