A survey of secure middleware for the Internet of Things

P Fremantle, P Scott - PeerJ Computer Science, 2017 - peerj.com
The rapid growth of small Internet connected devices, known as the Internet of Things (IoT),
is creating a new set of challenges to create secure, private infrastructures. This paper …

Trusted cloud computing architectures for infrastructure as a service: Survey and systematic literature review

FAM Ibrahim, EE Hemayed - Computers & Security, 2019 - Elsevier
Cloud computing is no longer the future but the present. Security and trust are critical in
cloud computing, but how can cloud service tenants trust cloud service providers to store all …

Code-pointer integrity

V Kuznetzov, L Szekeres, M Payer, G Candea… - The Continuing Arms …, 2018 - dl.acm.org
In this chapter, we describe code-pointer integrity (CPI), a new design point that guarantees
the integrity of all code pointers in a program (eg, function pointers, saved return addresses) …

C-FLAT: control-flow attestation for embedded systems software

T Abera, N Asokan, L Davi, JE Ekberg… - Proceedings of the …, 2016 - dl.acm.org
Remote attestation is a crucial security service particularly relevant to increasingly popular
IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a …

Ironclad apps:{End-to-End} security via automated {Full-System} verification

C Hawblitzel, J Howell, JR Lorch, A Narayan… - … USENIX Symposium on …, 2014 - usenix.org
An Ironclad App lets a user securely transmit her data to a remote machine with the
guarantee that every instruction executed on that machine adheres to a formal abstract …

Lo-fat: Low-overhead control flow attestation in hardware

G Dessouky, S Zeitouni, T Nyman, A Paverd… - Proceedings of the 54th …, 2017 - dl.acm.org
Attacks targeting software on embedded systems are becoming increasingly prevalent.
Remote attestation is a mechanism that allows establishing trust in embedded devices …

Principles of remote attestation

G Coker, J Guttman, P Loscocco, A Herzog… - International journal of …, 2011 - Springer
Remote attestation is the activity of making a claim about properties of a target by supplying
evidence to an appraiser over a network. We identify five central principles to guide …

Towards a trust management system for cloud computing

SM Habib, S Ries, M Muhlhauser - 2011IEEE 10th International …, 2011 - ieeexplore.ieee.org
Cloud computing provides cost-efficient opportunities for enterprises by offering a variety of
dynamic, scalable, and shared services. Usually, cloud providers provide assurances by …

Things, trouble, trust: on building trust in IoT systems

T Abera, N Asokan, L Davi, F Koushanfar… - Proceedings of the 53rd …, 2016 - dl.acm.org
The emerging and much-touted Internet of Things (IoT) presents a variety of security and
privacy challenges. Prominent among them is the establishment of trust in remote IoT …

{Policy-Sealed} data: A new abstraction for building trusted cloud services

N Santos, R Rodrigues, KP Gummadi… - 21st USENIX Security …, 2012 - usenix.org
Accidental or intentional mismanagement of cloud software by administrators poses a
serious threat to the integrity and confidentiality of customer data hosted by cloud services …