Demystifying arm trustzone: A comprehensive survey
The world is undergoing an unprecedented technological transformation, evolving into a
state where ubiquitous Internet-enabled “things” will be able to generate and share large …
state where ubiquitous Internet-enabled “things” will be able to generate and share large …
Secure firmware Over-The-Air updates for IoT: Survey, challenges, and discussions
S El Jaouhari, E Bouvet - Internet of Things, 2022 - Elsevier
Abstract The Internet of Things (IoT) market has shown strong growth in recent years, where
many manufacturers of IoT devices and IoT-related service providers are competing. Time to …
many manufacturers of IoT devices and IoT-related service providers are competing. Time to …
Large-pose face alignment via CNN-based dense 3D model fitting
A Jourabloo, X Liu - Proceedings of the IEEE conference on …, 2016 - cv-foundation.org
Large-pose face alignment is a very challenging problem in computer vision, which is used
as a prerequisite for many important vision tasks, eg, face recognition and 3D face …
as a prerequisite for many important vision tasks, eg, face recognition and 3D face …
AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS
With the rise of Internet of Things (IoT) and Cyber-Physical Systems (CPS), the need for
smart embedded devices is rapidly increasing, and so does the security and privacy risk …
smart embedded devices is rapidly increasing, and so does the security and privacy risk …
PPMLAC: high performance chipset architecture for secure multi-party computation
Privacy issue is a main concern restricting data sharing and cross-organization
collaborations. While Privacy-Preserving Machine Learning techniques such as Multi-Party …
collaborations. While Privacy-Preserving Machine Learning techniques such as Multi-Party …
Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes
With the extensive application of IoT techniques, IoT devices have become ubiquitous in
daily lives. Meanwhile, attacks against IoT devices have emerged to compromise IoT …
daily lives. Meanwhile, attacks against IoT devices have emerged to compromise IoT …
Shef: Shielded enclaves for cloud fpgas
FPGAs are now used in public clouds to accelerate a wide range of applications, including
many that operate on sensitive data such as financial and medical records. We present …
many that operate on sensitive data such as financial and medical records. We present …
A novel FPGA implementation of the NAND-PUF with minimal resource usage and high reliability
R Della Sala, G Scotti - Cryptography, 2023 - mdpi.com
In this work we propose a novel implementation on recent Xilinx FPGA platforms of a PUF
architecture based on the NAND SR-latch (referred to as NAND-PUF in the following) which …
architecture based on the NAND SR-latch (referred to as NAND-PUF in the following) which …
Enabling security-enhanced attestation with Intel SGX for remote terminal and IoT
Along with the advent and popularity of cloud computing, Internet of Things, and bring your
own device, the trust requirement for terminal devices has increased significantly. An …
own device, the trust requirement for terminal devices has increased significantly. An …
TEEFuzzer: A fuzzing framework for trusted execution environments with heuristic seed mutation
G Duan, Y Fu, B Zhang, P Deng, J Sun, H Chen… - Future Generation …, 2023 - Elsevier
With the rapid development of the Internet, data security faces new challenges. As a bridge
between the underlying hardware and upper layer applications, the operating system plays …
between the underlying hardware and upper layer applications, the operating system plays …