Advanced persistent threats and their defense methods in industrial Internet of things: A survey

C Gan, J Lin, DW Huang, Q Zhu, L Tian - Mathematics, 2023 - mdpi.com
The industrial internet of things (IIoT) is a key pillar of the intelligent society, integrating
traditional industry with modern information technology to improve production efficiency and …

Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

A survey of Internet of Things (IoT) for geohazard prevention: Applications, technologies, and challenges

G Mei, N Xu, J Qin, B Wang, P Qi - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Geologic hazards (geohazards) are naturally occurring or human-activity-induced geologic
conditions capable of causing damage or loss of property and/or life. geohazards, such as …

Sok: Hardware-supported trusted execution environments

M Schneider, RJ Masti, S Shinde, S Capkun… - arXiv preprint arXiv …, 2022 - arxiv.org
The growing complexity of modern computing platforms and the need for strong isolation
protections among their software components has led to the increased adoption of Trusted …

A survey on risc-v security: Hardware and architecture

T Lu - arXiv preprint arXiv:2107.04175, 2021 - arxiv.org
The Internet of Things (IoT) is an ongoing technological revolution. Embedded processors
are the processing engines of smart IoT devices. For decades, these processors were …

State of the art: Secure mobile payment

W Liu, X Wang, W Peng - IEEE Access, 2020 - ieeexplore.ieee.org
With mobile payments popular around the world, payers can conduct a payment anytime
and anywhere. While providing great convenience, mobile payment also brings many …

Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation

FT Chimuco, JBF Sequeiros, CG Lopes… - International Journal of …, 2023 - Springer
The adoption and popularization of mobile devices, such as smartphones and tablets,
accentuated after the second decade of this century, has been motivated by the growing …

Confidential computing in cloud/fog-based Internet of Things scenarios

DCG Valadares, NC Will, MA Spohn… - Internet of Things, 2022 - Elsevier
Abstract Internet of Things (IoT) devices are increasingly present in people's daily lives,
collecting different types of data about the environment, user behavior, medical data, and …

Hardware-assisted mechanisms to enforce control flow integrity: A comprehensive survey

S Kumar, D Moolchandani, SR Sarangi - Journal of Systems Architecture, 2022 - Elsevier
Today, a vast amount of sensitive data worth millions of dollars is processed in untrusted
data centers; hence, the confidentiality and integrity of the code and data are of paramount …

Early DGA-based botnet identification: pushing detection to the edges

M Zago, M Gil Pérez, G Martínez Pérez - Cluster Computing, 2021 - Springer
With the first commercially available 5G infrastructures, worldwide's attention is shifting to the
next generation of theorised technologies that might be finally deployable. In this context, the …