Detecting compromised IoT devices: Existing techniques, challenges, and a way forward

I Makhdoom, M Abolhasan, D Franklin, J Lipman… - Computers & …, 2023 - Elsevier
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …

A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects

B Kuang, A Fu, W Susilo, S Yu, Y Gao - Computers & Security, 2022 - Elsevier
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially
considering the fact that 5G technology facilitates numerous services building on IoT …

Sok: Runtime integrity

M Ammar, A Caulfield, IDO Nunes - arxiv preprint arxiv:2408.10200, 2024 - arxiv.org
This paper provides a systematic exploration of Control Flow Integrity (CFI) and Control Flow
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …

Rt-tee: Real-time system availability for cyber-physical systems using arm trustzone

J Wang, A Li, H Li, C Lu, N Zhang - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Embedded devices are becoming increasingly pervasive in safety-critical systems of the
emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM …

DICE: Automatic emulation of DMA input channels for dynamic firmware analysis

A Mera, B Feng, L Lu, E Kirda - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Microcontroller-based embedded devices are at the core of Internet-of-Things (IoT) and
Cyber-Physical Systems (CPS). The security of these devices is of paramount importance …

On bridging the gap between control flow integrity and attestation schemes

M Ammar, A Abdelraoof, S Vlasceanu - 33rd USENIX Security …, 2024 - usenix.org
Control-flow hijacking attacks are still a major challenge in software security. Several means
of protection and detection have been proposed but gaps still exist. To bridge such gaps …

Empirical study of PLC authentication protocols in industrial control systems

A Ayub, H Yoo, I Ahmed - 2021 IEEE Security and Privacy …, 2021 - ieeexplore.ieee.org
Programmable logic controllers (PLCs) run a 'control logic'program that defines how to
control a physical process such as a nuclear plant, power grid stations, and gas pipelines …

On the TOCTOU problem in remote attestation

I De Oliveira Nunes, S Jakkamsetti… - Proceedings of the …, 2021 - dl.acm.org
Much attention has been devoted to verifying software integrity of remote embedded (IoT)
devices. Many techniques, with different assumptions and security guarantees, have been …

{SHiFT}: Semi-hosted Fuzz Testing for Embedded Applications

A Mera, C Liu, R Sun, E Kirda, L Lu - 33rd USENIX Security Symposium …, 2024 - usenix.org
Modern microcontrollers (MCU) s are ubiquitous on critical embedded applications in the IoT
era. Therefore, securing MCU firmware is fundamental. To analyze MCU firmware security …

InsectACIDE: Debugger-based holistic asynchronous CFI for embedded system

Y Wang, CL Mack, X Tan, N Zhang… - 2024 IEEE 30th Real …, 2024 - ieeexplore.ieee.org
Real-time and embedded systems are predominantly written in C, a language that is
notoriously not memory safe. This has led to widespread memory-corruption vulnerabilities …