{PISTIS}: Trusted computing architecture for low-end embedded systems
Recently, several hardware-assisted security architectures have been proposed to mitigate
the ever-growing cyber-attacks on Internet-connected devices. However, such proposals are …
the ever-growing cyber-attacks on Internet-connected devices. However, such proposals are …
Low-cost privilege separation with compile time compartmentalization for embedded systems
Embedded systems are pervasive and find various applications all around us. These
systems run on low-power microcontrollers with real-time constraints. Developers often …
systems run on low-power microcontrollers with real-time constraints. Developers often …
Reviewing IoT security via logic bugs in IoT platforms and systems
In recent years, Internet-of-Things (IoT) platforms and systems have been rapidly emerging.
Although IoT is a new technology, new does not mean simpler (than existing networked …
Although IoT is a new technology, new does not mean simpler (than existing networked …
CompartOS: CHERI compartmentalization for embedded systems
Existing high-end embedded systems face frequent security attacks. Software
compartmentalization is one technique to limit the attacks' effects to the compromised …
compartmentalization is one technique to limit the attacks' effects to the compromised …
MPI: Memory Protection for Intermittent Computing
Batteryless devices harvest energy from sporadic ambient sources, enabling a wide range of
long-lived, stand-alone, and environmentally-friendly sustainable applications. Software on …
long-lived, stand-alone, and environmentally-friendly sustainable applications. Software on …
{SoK}:{Where's} the {“up”?}! A Comprehensive (bottom-up) Study on the Security of Arm {Cortex-M} Systems
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internet-of-Things devices. Despite the widespread usage, there has been …
embedded and Internet-of-Things devices. Despite the widespread usage, there has been …
Where's the" up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internetof-Things devices. Despite the widespread usage, there has been …
embedded and Internetof-Things devices. Despite the widespread usage, there has been …
CHERI compartmentalisation for embedded systems
H Almatary - 2022 - repository.cam.ac.uk
Embedded system designers are facing an inexorable pressure to add more features and
leverage connectivity. This creates potential attack vectors in areas that were not subject to …
leverage connectivity. This creates potential attack vectors in areas that were not subject to …
Is the Canary Dead? On the Effectiveness of Stack Canaries on Microcontroller Systems
Microcontroller units (MCUs) are compact computers tailored for embedded and Internet-of-
Things (IoT) applications. MCU-based devices primarily run software systems coded in low …
Things (IoT) applications. MCU-based devices primarily run software systems coded in low …
FLAShadow: A Flash-based Shadow Stack for Low-end Embedded Systems
Runtime attacks are a rising threat to both low-and high-end systems with the spread of
techniques such as Return-Oriented Programming (ROP), which aims at hijacking the …
techniques such as Return-Oriented Programming (ROP), which aims at hijacking the …