We propose a primitive, called Pioneer, as a rst step towards veriable code execution on untrusted legacy hosts. Pioneer does not require any hardware support such as secure co-processors or CPU-architecture extensions. We implement Pioneer on an Intel Pentium IV Xeon processor. Pioneer can be used as a basic building block to build security systems. We demonstrate this by building a kernel rootkit detector
Embedded systems are subjected to various adversaries including software attacks, physical attacks, ...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
Remote attestation, as a challenge-response protocol, enables a trusted entity, called verifier, to ...
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrust...
AbstractA lot of progress has been made to secure network communication, e.g., through the use of cr...
Security is emerging as an important concern in embedded system design. The security of embedded sys...
International audienceIn the last few decades embedded processors have invaded the modern lifestyle....
Remote attestation is the process of securely verifying internal state of a remote hardware platform...
AbstractA lot of progress has been made to secure network communication, e.g., through the use of cr...
Remote attestation is the process of securely veri-fying internal state of a remote hardware platfor...
System integrity monitors, such as rootkit detectors, rely critically on the ability to fetch and in...
In this paper, we present SobTrA, a Software-based Trust Anchor for ARM Cortex-A processors to prote...
Attacks on embedded devices are becoming more and more prevalent, primarily due to the extensively i...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
Modern society is increasingly surrounded by, and is growing accustomed to, a wide range of Cyber-Ph...
Embedded systems are subjected to various adversaries including software attacks, physical attacks, ...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
Remote attestation, as a challenge-response protocol, enables a trusted entity, called verifier, to ...
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrust...
AbstractA lot of progress has been made to secure network communication, e.g., through the use of cr...
Security is emerging as an important concern in embedded system design. The security of embedded sys...
International audienceIn the last few decades embedded processors have invaded the modern lifestyle....
Remote attestation is the process of securely verifying internal state of a remote hardware platform...
AbstractA lot of progress has been made to secure network communication, e.g., through the use of cr...
Remote attestation is the process of securely veri-fying internal state of a remote hardware platfor...
System integrity monitors, such as rootkit detectors, rely critically on the ability to fetch and in...
In this paper, we present SobTrA, a Software-based Trust Anchor for ARM Cortex-A processors to prote...
Attacks on embedded devices are becoming more and more prevalent, primarily due to the extensively i...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
Modern society is increasingly surrounded by, and is growing accustomed to, a wide range of Cyber-Ph...
Embedded systems are subjected to various adversaries including software attacks, physical attacks, ...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
Remote attestation, as a challenge-response protocol, enables a trusted entity, called verifier, to ...