Demystifying arm trustzone: A comprehensive survey
The world is undergoing an unprecedented technological transformation, evolving into a
state where ubiquitous Internet-enabled “things” will be able to generate and share large …
state where ubiquitous Internet-enabled “things” will be able to generate and share large …
Hardware-assisted machine learning in resource-constrained IoT environments for security: review and future prospective
G Kornaros - IEEE Access, 2022 - ieeexplore.ieee.org
As the Internet of Things (IoT) technology advances, billions of multidisciplinary smart
devices act in concert, rarely requiring human intervention, posing significant challenges in …
devices act in concert, rarely requiring human intervention, posing significant challenges in …
Foreshadow: Extracting the keys to the intel {SGX} kingdom with transient {Out-of-Order} execution
Trusted execution environments, and particularly the Software Guard eXtensions (SGX)
included in recent Intel x86 processors, gained significant traction in recent years. A long …
included in recent Intel x86 processors, gained significant traction in recent years. A long …
A survey on blockchain-based trust management for Internet of Things
Internet of Things (IoT) aims to create a vast network with billions of things that can
seamlessly create and exchange data, establishing intelligent interactions between people …
seamlessly create and exchange data, establishing intelligent interactions between people …
Telling your secrets without page faults: Stealthy page {Table-Based} attacks on enclaved execution
Protected module architectures, such as Intel SGX, enable strong trusted computing
guarantees for hardware-enforced enclaves on top a potentially malicious operating system …
guarantees for hardware-enforced enclaves on top a potentially malicious operating system …
SGX-Step: A practical attack framework for precise enclave execution control
Protected module architectures such as Intel SGX hold the promise of protecting sensitive
computations from a potentially compromised operating system. Recent research …
computations from a potentially compromised operating system. Recent research …
A tale of two worlds: Assessing the vulnerability of enclave shielding runtimes
This paper analyzes the vulnerability space arising in Trusted Execution Environments
(TEEs) when interfacing a trusted enclave application with untrusted, potentially malicious …
(TEEs) when interfacing a trusted enclave application with untrusted, potentially malicious …
Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic
Recent research on transient execution vulnerabilities shows that current processors exceed
our levels of understanding. The prominent Meltdown and Spectre attacks abruptly revealed …
our levels of understanding. The prominent Meltdown and Spectre attacks abruptly revealed …
Sancus 2.0: A low-cost security architecture for iot devices
The Sancus security architecture for networked embedded devices was proposed in 2013 at
the USENIX Security conference. It supports remote (even third-party) software installation …
the USENIX Security conference. It supports remote (even third-party) software installation …
[PDF][PDF] Timber-v: Tag-isolated memory bringing fine-grained enclaves to risc-v
Embedded computing devices are used on a large scale in the emerging internet of things
(IoT). However, their wide deployment raises the incentive for attackers to target these …
(IoT). However, their wide deployment raises the incentive for attackers to target these …