Demystifying arm trustzone: A comprehensive survey

S Pinto, N Santos - ACM computing surveys (CSUR), 2019 - dl.acm.org
The world is undergoing an unprecedented technological transformation, evolving into a
state where ubiquitous Internet-enabled “things” will be able to generate and share large …

Secure firmware Over-The-Air updates for IoT: Survey, challenges, and discussions

S El Jaouhari, E Bouvet - Internet of Things, 2022 - Elsevier
Abstract The Internet of Things (IoT) market has shown strong growth in recent years, where
many manufacturers of IoT devices and IoT-related service providers are competing. Time to …

Large-pose face alignment via CNN-based dense 3D model fitting

A Jourabloo, X Liu - Proceedings of the IEEE conference on …, 2016 - cv-foundation.org
Large-pose face alignment is a very challenging problem in computer vision, which is used
as a prerequisite for many important vision tasks, eg, face recognition and 3D face …

AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS

W Feng, Y Qin, S Zhao, D Feng - Computer Networks, 2018 - Elsevier
With the rise of Internet of Things (IoT) and Cyber-Physical Systems (CPS), the need for
smart embedded devices is rapidly increasing, and so does the security and privacy risk …

PPMLAC: high performance chipset architecture for secure multi-party computation

X Zhou, Z Xu, C Wang, M Gao - Proceedings of the 49th Annual …, 2022 - dl.acm.org
Privacy issue is a main concern restricting data sharing and cross-organization
collaborations. While Privacy-Preserving Machine Learning techniques such as Multi-Party …

Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes

Z Ling, H Yan, X Shao, J Luo, Y Xu, B Pearson… - Journal of Systems …, 2021 - Elsevier
With the extensive application of IoT techniques, IoT devices have become ubiquitous in
daily lives. Meanwhile, attacks against IoT devices have emerged to compromise IoT …

Shef: Shielded enclaves for cloud fpgas

M Zhao, M Gao, C Kozyrakis - Proceedings of the 27th ACM International …, 2022 - dl.acm.org
FPGAs are now used in public clouds to accelerate a wide range of applications, including
many that operate on sensitive data such as financial and medical records. We present …

A novel FPGA implementation of the NAND-PUF with minimal resource usage and high reliability

R Della Sala, G Scotti - Cryptography, 2023 - mdpi.com
In this work we propose a novel implementation on recent Xilinx FPGA platforms of a PUF
architecture based on the NAND SR-latch (referred to as NAND-PUF in the following) which …

Enabling security-enhanced attestation with Intel SGX for remote terminal and IoT

J Wang, Z Hong, Y Zhang, Y Jin - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Along with the advent and popularity of cloud computing, Internet of Things, and bring your
own device, the trust requirement for terminal devices has increased significantly. An …

TEEFuzzer: A fuzzing framework for trusted execution environments with heuristic seed mutation

G Duan, Y Fu, B Zhang, P Deng, J Sun, H Chen… - Future Generation …, 2023 - Elsevier
With the rapid development of the Internet, data security faces new challenges. As a bridge
between the underlying hardware and upper layer applications, the operating system plays …