A review of IoT firmware vulnerabilities and auditing techniques
In recent years, the Internet of Things (IoT) paradigm has been widely applied across a
variety of industrial and consumer areas to facilitate greater automation and increase …
variety of industrial and consumer areas to facilitate greater automation and increase …
Detecting compromised IoT devices: Existing techniques, challenges, and a way forward
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
Fog computing for the internet of things: A survey
Research in the Internet of Things (IoT) conceives a world where everyday objects are
connected to the Internet and exchange, store, process, and collect data from the …
connected to the Internet and exchange, store, process, and collect data from the …
{VRASED}: A verified {Hardware/Software}{Co-Design} for remote attestation
Remote Attestation (RA) is a distinct security service that allows a trusted verifier (Vrf) to
measure the software state of an untrusted remote prover (Prv). If correctly implemented, RA …
measure the software state of an untrusted remote prover (Prv). If correctly implemented, RA …
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially
considering the fact that 5G technology facilitates numerous services building on IoT …
considering the fact that 5G technology facilitates numerous services building on IoT …
Things, trouble, trust: on building trust in IoT systems
The emerging and much-touted Internet of Things (IoT) presents a variety of security and
privacy challenges. Prominent among them is the establishment of trust in remote IoT …
privacy challenges. Prominent among them is the establishment of trust in remote IoT …
Watz: A trusted webassembly runtime environment with remote attestation for trustzone
WebAssembly (Wasm) is a novel low-level bytecode format that swiftly gained popularity for
its efficiency, versatility and security, with near-native performance. Besides, trusted …
its efficiency, versatility and security, with near-native performance. Besides, trusted …
AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS
With the rise of Internet of Things (IoT) and Cyber-Physical Systems (CPS), the need for
smart embedded devices is rapidly increasing, and so does the security and privacy risk …
smart embedded devices is rapidly increasing, and so does the security and privacy risk …
ASSURED: Architecture for secure software update of realistic embedded devices
Secure firmware update is an important stage in the Internet of Things (IoT) device life-cycle.
Prior techniques, designed for other computational settings, are not readily suitable for IoT …
Prior techniques, designed for other computational settings, are not readily suitable for IoT …
{APEX}: A verified architecture for proofs of execution on remote devices under full software compromise
Modern society is increasingly surrounded by, and is growing accustomed to, a wide range
of Cyber-Physical Systems (CPS), Internet-of-Things (IoT), and smart devices. They often …
of Cyber-Physical Systems (CPS), Internet-of-Things (IoT), and smart devices. They often …