UAV IoT framework views and challenges: Towards protecting drones as “Things”
Unmanned aerial vehicles (UAVs) have enormous potential in enabling new applications in
various areas, ranging from military, security, medicine, and surveillance to traffic-monitoring …
various areas, ranging from military, security, medicine, and surveillance to traffic-monitoring …
Establishing mutually trusted channels for remote sensing devices with trusted execution environments
Remote and largely unattended sensing devices are being deployed rapidly in sensitive
environments, such as healthcare, in the home, and on corporate premises. A major …
environments, such as healthcare, in the home, and on corporate premises. A major …
EmLog: tamper-resistant system logging for constrained devices with TEEs
Remote mobile and embedded devices are used to deliver increasingly impactful services,
such as medical rehabilitation and assistive technologies. Secure system logging is …
such as medical rehabilitation and assistive technologies. Secure system logging is …
An exploratory analysis of the security risks of the Internet of Things in finance
Abstract The Internet of Things (IoT) is projected to significantly impact consumer finance,
through greater customer personalisation, more frictionless payments, and novel pricing …
through greater customer personalisation, more frictionless payments, and novel pricing …
Remote credential management with mutual attestation for trusted execution environments
Abstract Trusted Execution Environments (TEEs) are rapidly emerging as a root-of-trust for
protecting sensitive applications and data using hardware-backed isolated worlds of …
protecting sensitive applications and data using hardware-backed isolated worlds of …
Privacy-enhancing context authentication from location-sensitive data
This paper proposes a new privacy-enhancing, context-aware user authentication system,
ConSec, which uses a transformation of general location-sensitive data, such as GPS …
ConSec, which uses a transformation of general location-sensitive data, such as GPS …
Mobile App to SGX Enclave Secure Channel
The current challenge for several applications is to guarantee the user's privacy when using
personal data. The broader problem is to transfer and process the data without exposing the …
personal data. The broader problem is to transfer and process the data without exposing the …
Proximity assurances based on natural and artificial ambient environments
Relay attacks are passive man-in-the-middle attacks that aim to extend the physical distance
of devices involved in a transaction beyond their operating environment. In the field of smart …
of devices involved in a transaction beyond their operating environment. In the field of smart …
[PDF][PDF] Techniques for Establishing Trust in Modern Constrained Sensing Platforms with Trusted Execution Environments
C Shepherd - 2019 - researchgate.net
Abstract The Internet of Things (IoT)–the notion that interconnected everyday objects will
acquire the ability to monitor and act upon their environment–is anticipated to benefit …
acquire the ability to monitor and act upon their environment–is anticipated to benefit …
Secure Architectures for Mobile Financial Applications
FK CARVALHO OTA - 2023 - orbilu.uni.lu
This thesis examines the impact of the security and privacy challenges of mobile
applications on software engineering paradigms. As mobile apps become central to daily …
applications on software engineering paradigms. As mobile apps become central to daily …