A survey of Intel SGX and its applications
This paper presents a comprehensive survey on the development of Intel SGX (software
guard extensions) processors and its applications. With the advent of SGX in 2013 and its …
guard extensions) processors and its applications. With the advent of SGX in 2013 and its …
[PDF][PDF] RAI: Securing Embedded Systems with Return Address Integrity
NS Almakhdhub, AA Clements, S Bagchi… - Network and Distributed …, 2020 - par.nsf.gov
Embedded systems are deployed in security critical environments and have become a
prominent target for remote attacks. Microcontroller-based systems (MCUS) are particularly …
prominent target for remote attacks. Microcontroller-based systems (MCUS) are particularly …
CRAFT: A continuous remote attestation framework for IoT
L Moreau, E Conchon, D Sauveron - IEEE Access, 2021 - ieeexplore.ieee.org
As Internet of Things (IoT) networks keep growing with regards to the number of devices they
contain, they become more attractive targets for attackers. Protecting these networks and the …
contain, they become more attractive targets for attackers. Protecting these networks and the …
ShieLD: Shielding Cross-zone Communication within Limited-resourced IoT Devices running Vulnerable Software Stack
Securing IoT devices is gaining attention as the security risks associated with these devices
increase rapidly. TrustZone-M, a Trusted Execution Environment (TEE) for Cortex-M …
increase rapidly. TrustZone-M, a Trusted Execution Environment (TEE) for Cortex-M …
An Adaptive Simultaneous Multi-Protocol Extension of CRAFT
L Moreau, E Conchon, D Sauveron - Sensors, 2023 - mdpi.com
An exponential number of devices connect to Internet of Things (IoT) networks every year,
increasing the available targets for attackers. Protecting such networks and devices against …
increasing the available targets for attackers. Protecting such networks and devices against …
Secure IoT device architecture using TrustZone
IoT realizes efficient system such as smart cities, smart factories, and smart agriculture.
However, there are risks of cyber attacks against the IoT with the potential to cause serious …
However, there are risks of cyber attacks against the IoT with the potential to cause serious …
Security architecture for trustworthy systems in 5g era
T Sasaki, S Karino, M Tani, K Nakajima… - arXiv preprint arXiv …, 2020 - arxiv.org
Systems using 5G are expected to be used in various cases of Society 5.0 and Industrie 4.0
such as smart cities, smart factories, and also critical infrastructures. These systems are …
such as smart cities, smart factories, and also critical infrastructures. These systems are …
[PDF][PDF] Confidential Computing via Multiparty Computation and Trusted Computing
J Dispan - 2023 - jdispan.de
In the wake of the social sciences' so-called replication crisis, researches increasingly strive
to adopt methods preventing questionable research practices in empirical studies, eg, study …
to adopt methods preventing questionable research practices in empirical studies, eg, study …
Internet of Things Systems Security: Benchmarking and Protection
NS Almakhdhub - 2020 - search.proquest.com
Abstract Internet of Things (IoT) systems running on Microcontrollers (MCUS) have become
a prominent target of remote attacks. Although deployed in security and safety critical …
a prominent target of remote attacks. Although deployed in security and safety critical …
THE PURDUE UNIVERSITY GRADUATE SCHOOL STATEMENT OF DISSERTATION APPROVAL
Z Shen - 2020 - search.proquest.com
Although current augmented, virtual, and mixed reality (AR/VR/MR) systems are facing
advanced and immersive experience in the entertainment industry with countless media …
advanced and immersive experience in the entertainment industry with countless media …