Detecting compromised IoT devices: Existing techniques, challenges, and a way forward
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially
considering the fact that 5G technology facilitates numerous services building on IoT …
considering the fact that 5G technology facilitates numerous services building on IoT …
Sok: Runtime integrity
This paper provides a systematic exploration of Control Flow Integrity (CFI) and Control Flow
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …
Rt-tee: Real-time system availability for cyber-physical systems using arm trustzone
Embedded devices are becoming increasingly pervasive in safety-critical systems of the
emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM …
emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM …
DICE: Automatic emulation of DMA input channels for dynamic firmware analysis
Microcontroller-based embedded devices are at the core of Internet-of-Things (IoT) and
Cyber-Physical Systems (CPS). The security of these devices is of paramount importance …
Cyber-Physical Systems (CPS). The security of these devices is of paramount importance …
On bridging the gap between control flow integrity and attestation schemes
Control-flow hijacking attacks are still a major challenge in software security. Several means
of protection and detection have been proposed but gaps still exist. To bridge such gaps …
of protection and detection have been proposed but gaps still exist. To bridge such gaps …
Empirical study of PLC authentication protocols in industrial control systems
Programmable logic controllers (PLCs) run a 'control logic'program that defines how to
control a physical process such as a nuclear plant, power grid stations, and gas pipelines …
control a physical process such as a nuclear plant, power grid stations, and gas pipelines …
On the TOCTOU problem in remote attestation
Much attention has been devoted to verifying software integrity of remote embedded (IoT)
devices. Many techniques, with different assumptions and security guarantees, have been …
devices. Many techniques, with different assumptions and security guarantees, have been …
{SHiFT}: Semi-hosted Fuzz Testing for Embedded Applications
Modern microcontrollers (MCU) s are ubiquitous on critical embedded applications in the IoT
era. Therefore, securing MCU firmware is fundamental. To analyze MCU firmware security …
era. Therefore, securing MCU firmware is fundamental. To analyze MCU firmware security …
InsectACIDE: Debugger-based holistic asynchronous CFI for embedded system
Real-time and embedded systems are predominantly written in C, a language that is
notoriously not memory safe. This has led to widespread memory-corruption vulnerabilities …
notoriously not memory safe. This has led to widespread memory-corruption vulnerabilities …