Detecting compromised IoT devices: Existing techniques, challenges, and a way forward

I Makhdoom, M Abolhasan, D Franklin, J Lipman… - Computers & …, 2023 - Elsevier
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …

Attestation mechanisms for trusted execution environments demystified

J Ménétrey, C Göttel, A Khurshid, M Pasin… - IFIP International …, 2022 - Springer
Attestation is a fundamental building block to establish trust over software systems. When
used in conjunction with trusted execution environments, it guarantees the genuineness of …

WaTZ: A trusted WebAssembly runtime environment with remote attestation for TrustZone

J Ménétrey, M Pasin, P Felber… - 2022 IEEE 42nd …, 2022 - ieeexplore.ieee.org
WebAssembly (Wasm) is a novel low-level bytecode format that swiftly gained popularity for
its efficiency, versatility and security, with near-native performance. Besides, trusted …

An exploratory study of attestation mechanisms for trusted execution environments

J Ménétrey, C Göttel, M Pasin, P Felber… - arXiv preprint arXiv …, 2022 - arxiv.org
Attestation is a fundamental building block to establish trust over software systems. When
used in conjunction with trusted execution environments, it guarantees that genuine code is …

Current research trends in IoT security: a systematic mapping study

JY Lee, J Lee - Mobile Information Systems, 2021 - Wiley Online Library
The smart mobile Internet‐of‐things (IoT) network lays the foundation of the fourth industrial
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …

Remote attestation: A literature review

AS Banks, M Kisiel, P Korsholm - arXiv preprint arXiv:2105.02466, 2021 - arxiv.org
With the rising number of IoT devices, the security of such devices becomes increasingly
important. Remote attestation (RA) is a distinct security service that allows a remote verifer to …

SoK: A Systematic Review of TEE Usage for Developing Trusted Applications

A Paju, MO Javed, J Nurmi, J Savimäki… - Proceedings of the 18th …, 2023 - dl.acm.org
Trusted Execution Environments (TEEs) are a feature of modern central processing units
(CPUs) that aim to provide a high assurance, isolated environment in which to run …

Isc-flat: On the conflict between control flow attestation and real-time operations

AJ Neto, IDO Nunes - 2023 IEEE 29th Real-Time and …, 2023 - ieeexplore.ieee.org
The wide adoption of IoT gadgets and CyberPhysical Systems (CPS) makes embedded
devices increasingly important. While some of these devices perform mission-critical tasks …

Tee-based key-value stores: a survey

A Ait Messaoud, S Ben Mokhtar, A Simonet-Boulogne - The VLDB Journal, 2025 - Springer
Abstract Key-Value Stores (KVSs) are No-SQL databases that store data as key-value pairs
and have gained popularity due to their simplicity, scalability, and fast retrieval capabilities …

[PDF][PDF] Machine Learning-Based Efficient Discovery of Software Vulnerability for Internet of Things.

SE Jeon, SJ Lee, IG Lee - Intelligent Automation & Soft …, 2023 - cdn.techscience.cn
With the development of the 5th generation of mobile communication (5G) networks and
artificial intelligence (AI) technologies, the use of the Internet of Things (IoT) has expanded …