A survey of Intel SGX and its applications

W Zheng, Y Wu, X Wu, C Feng, Y Sui, X Luo… - Frontiers of Computer …, 2021 - Springer
This paper presents a comprehensive survey on the development of Intel SGX (software
guard extensions) processors and its applications. With the advent of SGX in 2013 and its …

[PDF][PDF] RAI: Securing Embedded Systems with Return Address Integrity

NS Almakhdhub, AA Clements, S Bagchi… - Network and Distributed …, 2020 - par.nsf.gov
Embedded systems are deployed in security critical environments and have become a
prominent target for remote attacks. Microcontroller-based systems (MCUS) are particularly …

CRAFT: A continuous remote attestation framework for IoT

L Moreau, E Conchon, D Sauveron - IEEE Access, 2021 - ieeexplore.ieee.org
As Internet of Things (IoT) networks keep growing with regards to the number of devices they
contain, they become more attractive targets for attackers. Protecting these networks and the …

ShieLD: Shielding Cross-zone Communication within Limited-resourced IoT Devices running Vulnerable Software Stack

A Khurshid, SD Yalew, M Aslam… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Securing IoT devices is gaining attention as the security risks associated with these devices
increase rapidly. TrustZone-M, a Trusted Execution Environment (TEE) for Cortex-M …

An Adaptive Simultaneous Multi-Protocol Extension of CRAFT

L Moreau, E Conchon, D Sauveron - Sensors, 2023 - mdpi.com
An exponential number of devices connect to Internet of Things (IoT) networks every year,
increasing the available targets for attackers. Protecting such networks and devices against …

Secure IoT device architecture using TrustZone

T Sasaki, K Tomita, Y Hayaki, SP Liew… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
IoT realizes efficient system such as smart cities, smart factories, and smart agriculture.
However, there are risks of cyber attacks against the IoT with the potential to cause serious …

Security architecture for trustworthy systems in 5g era

T Sasaki, S Karino, M Tani, K Nakajima… - arXiv preprint arXiv …, 2020 - arxiv.org
Systems using 5G are expected to be used in various cases of Society 5.0 and Industrie 4.0
such as smart cities, smart factories, and also critical infrastructures. These systems are …

[PDF][PDF] Confidential Computing via Multiparty Computation and Trusted Computing

J Dispan - 2023 - jdispan.de
In the wake of the social sciences' so-called replication crisis, researches increasingly strive
to adopt methods preventing questionable research practices in empirical studies, eg, study …

Internet of Things Systems Security: Benchmarking and Protection

NS Almakhdhub - 2020 - search.proquest.com
Abstract Internet of Things (IoT) systems running on Microcontrollers (MCUS) have become
a prominent target of remote attacks. Although deployed in security and safety critical …

THE PURDUE UNIVERSITY GRADUATE SCHOOL STATEMENT OF DISSERTATION APPROVAL

Z Shen - 2020 - search.proquest.com
Although current augmented, virtual, and mixed reality (AR/VR/MR) systems are facing
advanced and immersive experience in the entertainment industry with countless media …