UAV IoT framework views and challenges: Towards protecting drones as “Things”

T Lagkas, V Argyriou, S Bibi, P Sarigiannidis - Sensors, 2018 - mdpi.com
Unmanned aerial vehicles (UAVs) have enormous potential in enabling new applications in
various areas, ranging from military, security, medicine, and surveillance to traffic-monitoring …

Establishing mutually trusted channels for remote sensing devices with trusted execution environments

C Shepherd, RN Akram, K Markantonakis - Proceedings of the 12th …, 2017 - dl.acm.org
Remote and largely unattended sensing devices are being deployed rapidly in sensitive
environments, such as healthcare, in the home, and on corporate premises. A major …

EmLog: tamper-resistant system logging for constrained devices with TEEs

C Shepherd, RN Akram, K Markantonakis - Information Security Theory …, 2018 - Springer
Remote mobile and embedded devices are used to deliver increasingly impactful services,
such as medical rehabilitation and assistive technologies. Secure system logging is …

An exploratory analysis of the security risks of the Internet of Things in finance

C Shepherd, FAP Petitcolas, RN Akram… - Trust, Privacy and …, 2017 - Springer
Abstract The Internet of Things (IoT) is projected to significantly impact consumer finance,
through greater customer personalisation, more frictionless payments, and novel pricing …

Remote credential management with mutual attestation for trusted execution environments

C Shepherd, RN Akram, K Markantonakis - Information Security Theory …, 2019 - Springer
Abstract Trusted Execution Environments (TEEs) are rapidly emerging as a root-of-trust for
protecting sensitive applications and data using hardware-backed isolated worlds of …

Privacy-enhancing context authentication from location-sensitive data

P Mainali, C Shepherd, FAP Petitcolas - Proceedings of the 14th …, 2019 - dl.acm.org
This paper proposes a new privacy-enhancing, context-aware user authentication system,
ConSec, which uses a transformation of general location-sensitive data, such as GPS …

Mobile App to SGX Enclave Secure Channel

FKC Ota, JA Meira, CR Cassagnes… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
The current challenge for several applications is to guarantee the user's privacy when using
personal data. The broader problem is to transfer and process the data without exposing the …

Proximity assurances based on natural and artificial ambient environments

I Gurulian, K Markantonakis, C Shepherd… - … Security Solutions for …, 2017 - Springer
Relay attacks are passive man-in-the-middle attacks that aim to extend the physical distance
of devices involved in a transaction beyond their operating environment. In the field of smart …

[PDF][PDF] Techniques for Establishing Trust in Modern Constrained Sensing Platforms with Trusted Execution Environments

C Shepherd - 2019 - researchgate.net
Abstract The Internet of Things (IoT)–the notion that interconnected everyday objects will
acquire the ability to monitor and act upon their environment–is anticipated to benefit …

Secure Architectures for Mobile Financial Applications

FK CARVALHO OTA - 2023 - orbilu.uni.lu
This thesis examines the impact of the security and privacy challenges of mobile
applications on software engineering paradigms. As mobile apps become central to daily …