Advanced persistent threats and their defense methods in industrial Internet of things: A survey
The industrial internet of things (IIoT) is a key pillar of the intelligent society, integrating
traditional industry with modern information technology to improve production efficiency and …
traditional industry with modern information technology to improve production efficiency and …
Intel software guard extensions applications: A survey
NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
A survey of Internet of Things (IoT) for geohazard prevention: Applications, technologies, and challenges
Geologic hazards (geohazards) are naturally occurring or human-activity-induced geologic
conditions capable of causing damage or loss of property and/or life. geohazards, such as …
conditions capable of causing damage or loss of property and/or life. geohazards, such as …
Sok: Hardware-supported trusted execution environments
The growing complexity of modern computing platforms and the need for strong isolation
protections among their software components has led to the increased adoption of Trusted …
protections among their software components has led to the increased adoption of Trusted …
A survey on risc-v security: Hardware and architecture
T Lu - arXiv preprint arXiv:2107.04175, 2021 - arxiv.org
The Internet of Things (IoT) is an ongoing technological revolution. Embedded processors
are the processing engines of smart IoT devices. For decades, these processors were …
are the processing engines of smart IoT devices. For decades, these processors were …
State of the art: Secure mobile payment
W Liu, X Wang, W Peng - IEEE Access, 2020 - ieeexplore.ieee.org
With mobile payments popular around the world, payers can conduct a payment anytime
and anywhere. While providing great convenience, mobile payment also brings many …
and anywhere. While providing great convenience, mobile payment also brings many …
Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation
FT Chimuco, JBF Sequeiros, CG Lopes… - International Journal of …, 2023 - Springer
The adoption and popularization of mobile devices, such as smartphones and tablets,
accentuated after the second decade of this century, has been motivated by the growing …
accentuated after the second decade of this century, has been motivated by the growing …
Confidential computing in cloud/fog-based Internet of Things scenarios
Abstract Internet of Things (IoT) devices are increasingly present in people's daily lives,
collecting different types of data about the environment, user behavior, medical data, and …
collecting different types of data about the environment, user behavior, medical data, and …
Hardware-assisted mechanisms to enforce control flow integrity: A comprehensive survey
S Kumar, D Moolchandani, SR Sarangi - Journal of Systems Architecture, 2022 - Elsevier
Today, a vast amount of sensitive data worth millions of dollars is processed in untrusted
data centers; hence, the confidentiality and integrity of the code and data are of paramount …
data centers; hence, the confidentiality and integrity of the code and data are of paramount …
Early DGA-based botnet identification: pushing detection to the edges
With the first commercially available 5G infrastructures, worldwide's attention is shifting to the
next generation of theorised technologies that might be finally deployable. In this context, the …
next generation of theorised technologies that might be finally deployable. In this context, the …