Detecting compromised IoT devices: Existing techniques, challenges, and a way forward
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
Towards develo** high performance RISC-V processors using agile methodology
Y Xu, Z Yu, D Tang, G Chen, L Chen… - 2022 55th IEEE/ACM …, 2022 - ieeexplore.ieee.org
While research has shown that the agile chip design methodology is promising to sustain
the scaling of computing performance in a more efficient way, it is still of limited usage in …
the scaling of computing performance in a more efficient way, it is still of limited usage in …
A survey on risc-v security: Hardware and architecture
T Lu - arxiv preprint arxiv:2107.04175, 2021 - arxiv.org
The Internet of Things (IoT) is an ongoing technological revolution. Embedded processors
are the processing engines of smart IoT devices. For decades, these processors were …
are the processing engines of smart IoT devices. For decades, these processors were …
Teesec: Pre-silicon vulnerability discovery for trusted execution environments
Trusted execution environments (TEE) are CPU hardware extensions that provide security
guarantees for applications running on untrusted operating systems. The security of TEEs is …
guarantees for applications running on untrusted operating systems. The security of TEEs is …
Towards a formally verified security monitor for VM-based confidential computing
W Ozga - Proceedings of the 12th International Workshop on …, 2023 - dl.acm.org
Confidential computing is a key technology for isolating high-assurance applications from
the large amounts of untrusted code typical in modern systems. Existing confidential …
the large amounts of untrusted code typical in modern systems. Existing confidential …
Sok: Limitations of confidential computing via tees for high-performance compute systems
Trusted execution environments (TEEs) are primary enablers of confidential computing. This
paper presents a systematization of the existing trusted execution environments in industry …
paper presents a systematization of the existing trusted execution environments in industry …
Formalizing, verifying and applying ISA security guarantees as universal contracts
Progress has recently been made on specifying instruction set architectures (ISAs) in
executable formalisms rather than through prose. However, to date, those formal …
executable formalisms rather than through prose. However, to date, those formal …
ShieLD: Shielding Cross-zone Communication within Limited-resourced IoT Devices running Vulnerable Software Stack
Securing IoT devices is gaining attention as the security risks associated with these devices
increase rapidly. TrustZone-M, a Trusted Execution Environment (TEE) for Cortex-M …
increase rapidly. TrustZone-M, a Trusted Execution Environment (TEE) for Cortex-M …
Security Challenges Faced by RISC-V open-source Processors and its Security Features: A Survey
M Masood, Y Asfia, SG Khawaja - 2023 25th International …, 2023 - ieeexplore.ieee.org
RISC-V, an open-source instruction set architecture (ISA), presents unique security
dynamics due to its transparent development model. This survey illuminates the principal …
dynamics due to its transparent development model. This survey illuminates the principal …
Formal Verification of Security Properties on RISC-V Processors
CS Chuah, C Appold, T Leinmueller - Proceedings of the 21st ACM-IEEE …, 2023 - dl.acm.org
Hardware Security and trustworthiness are becoming ever more important, especially for
security-critical applications like autonomous driving and service robots. With the increase in …
security-critical applications like autonomous driving and service robots. With the increase in …