Keystone: An open framework for architecting trusted execution environments
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …
cloud servers and encompass a range of cost, power constraints, and security threat model …
The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved
Internet of Things (IoT) is an increasingly popular technology that enables physical devices,
vehicles, home appliances, etc., to communicate and even inter operate with one another. It …
vehicles, home appliances, etc., to communicate and even inter operate with one another. It …
Formal approaches to secure compilation: A survey of fully abstract compilation and related work
Secure compilation is a discipline aimed at develo** compilers that preserve the security
properties of the source programs they take as input in the target programs they produce as …
properties of the source programs they take as input in the target programs they produce as …
Collective remote attestation at the Internet of Things scale: State-of-the-art and future challenges
In recent years, the booming of Internet of Things (IoT) has populated the world with billions
of smart devices that implement novel services and applications. The potential for …
of smart devices that implement novel services and applications. The potential for …
Security and privacy challenges in industrial internet of things
Today, embedded, mobile, and cyberphysical systems are ubiquitous and used in many
applications, from industrial control systems, modern vehicles, to critical infrastructure …
applications, from industrial control systems, modern vehicles, to critical infrastructure …
C-FLAT: control-flow attestation for embedded systems software
Remote attestation is a crucial security service particularly relevant to increasingly popular
IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a …
IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a …
TrustLite: A security architecture for tiny embedded devices
Embedded systems are increasingly pervasive, interdependent and in many cases critical to
our every day life and safety. Tiny devices that cannot afford sophisticated hardware security …
our every day life and safety. Tiny devices that cannot afford sophisticated hardware security …
{CURE}: A security architecture with {CUstomizable} and resilient enclaves
Security architectures providing Trusted Execution Environments (TEEs) have been an
appealing research subject for a wide range of computer systems, from low-end embedded …
appealing research subject for a wide range of computer systems, from low-end embedded …
[PDF][PDF] SANCTUARY: ARMing TrustZone with User-space Enclaves.
ARM TrustZone is one of the most widely deployed security architecture providing Trusted
Execution Environments (TEEs). Unfortunately, its usage and potential benefits for …
Execution Environments (TEEs). Unfortunately, its usage and potential benefits for …
TyTAN: Tiny trust anchor for tiny devices
Embedded systems are at the core of many security-sensitive and safety-critical
applications, including automotive, industrial control systems, and critical infrastructures …
applications, including automotive, industrial control systems, and critical infrastructures …