Detecting compromised IoT devices: Existing techniques, challenges, and a way forward
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
Attestation mechanisms for trusted execution environments demystified
J Ménétrey, C Göttel, A Khurshid, M Pasin… - IFIP International …, 2022 - Springer
Attestation is a fundamental building block to establish trust over software systems. When
used in conjunction with trusted execution environments, it guarantees the genuineness of …
used in conjunction with trusted execution environments, it guarantees the genuineness of …
WaTZ: A trusted WebAssembly runtime environment with remote attestation for TrustZone
WebAssembly (Wasm) is a novel low-level bytecode format that swiftly gained popularity for
its efficiency, versatility and security, with near-native performance. Besides, trusted …
its efficiency, versatility and security, with near-native performance. Besides, trusted …
An exploratory study of attestation mechanisms for trusted execution environments
Attestation is a fundamental building block to establish trust over software systems. When
used in conjunction with trusted execution environments, it guarantees that genuine code is …
used in conjunction with trusted execution environments, it guarantees that genuine code is …
Current research trends in IoT security: a systematic mapping study
JY Lee, J Lee - Mobile Information Systems, 2021 - Wiley Online Library
The smart mobile Internet‐of‐things (IoT) network lays the foundation of the fourth industrial
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …
Remote attestation: A literature review
With the rising number of IoT devices, the security of such devices becomes increasingly
important. Remote attestation (RA) is a distinct security service that allows a remote verifer to …
important. Remote attestation (RA) is a distinct security service that allows a remote verifer to …
SoK: A Systematic Review of TEE Usage for Developing Trusted Applications
A Paju, MO Javed, J Nurmi, J Savimäki… - Proceedings of the 18th …, 2023 - dl.acm.org
Trusted Execution Environments (TEEs) are a feature of modern central processing units
(CPUs) that aim to provide a high assurance, isolated environment in which to run …
(CPUs) that aim to provide a high assurance, isolated environment in which to run …
Isc-flat: On the conflict between control flow attestation and real-time operations
The wide adoption of IoT gadgets and CyberPhysical Systems (CPS) makes embedded
devices increasingly important. While some of these devices perform mission-critical tasks …
devices increasingly important. While some of these devices perform mission-critical tasks …
Tee-based key-value stores: a survey
A Ait Messaoud, S Ben Mokhtar, A Simonet-Boulogne - The VLDB Journal, 2025 - Springer
Abstract Key-Value Stores (KVSs) are No-SQL databases that store data as key-value pairs
and have gained popularity due to their simplicity, scalability, and fast retrieval capabilities …
and have gained popularity due to their simplicity, scalability, and fast retrieval capabilities …
[PDF][PDF] Machine Learning-Based Efficient Discovery of Software Vulnerability for Internet of Things.
With the development of the 5th generation of mobile communication (5G) networks and
artificial intelligence (AI) technologies, the use of the Internet of Things (IoT) has expanded …
artificial intelligence (AI) technologies, the use of the Internet of Things (IoT) has expanded …