Part 2: Secure Resource Sharing and Access ControlInternational audienceLow-end embedded devices and the Internet of Things (IoT) are becoming increasingly important for our lives. They are being used in domains such as infrastructure management, and medical and healthcare systems, where business interests and our security and privacy are at stake. Yet, security mechanisms have been appallingly neglected on many IoT platforms. In this paper we present a secure access control mechanism for extremely lightweight embedded microcontrollers. Being based on Sancus, a hardware-only Trusted Computing Base and Protected Module Architecture for the embedded domain, our mechanism allows for multiple software modules on an IoT-node to securely share re...
This talk is inspired by a number of presentations I followed in previous years at QA&Test: I believ...
Modern society is increasingly surrounded by, and is growing accustomed to, a wide range of Cyber-Ph...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...
© IFIP International Federation for Information Processing 2015. Low-end embedded devices and the In...
The Sancus security architecture for networked embedded devices was proposed in 2013 at the USENIX S...
In this paper we propose Sancus, a security architecture for networked embedded devices. Sancus supp...
International audienceThe Internet of Things (IoT) is here, more than 10 billion units are already c...
The Internet of Things (IoT) has grown dramatically over the past years. Largely autonomous, lightwe...
Internet of Things (IoT) and Cyber-physical Systems (CPS) are two very hot research topics today, an...
Security in IoT devices is a major topic that IoT is facing. Rising awareness from the customer side...
In this paper we describe a novel approach to securely obtain measurements with respect to the integ...
The trustworthiness of microcontroller-class devices is crucial for a growing spectrum of applicatio...
Security in IoT devices is a global topic nowadays. Rising awareness and up-coming regulations will ...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
billion units are already connected and five times more devices are expected to be deployed in the n...
This talk is inspired by a number of presentations I followed in previous years at QA&Test: I believ...
Modern society is increasingly surrounded by, and is growing accustomed to, a wide range of Cyber-Ph...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...
© IFIP International Federation for Information Processing 2015. Low-end embedded devices and the In...
The Sancus security architecture for networked embedded devices was proposed in 2013 at the USENIX S...
In this paper we propose Sancus, a security architecture for networked embedded devices. Sancus supp...
International audienceThe Internet of Things (IoT) is here, more than 10 billion units are already c...
The Internet of Things (IoT) has grown dramatically over the past years. Largely autonomous, lightwe...
Internet of Things (IoT) and Cyber-physical Systems (CPS) are two very hot research topics today, an...
Security in IoT devices is a major topic that IoT is facing. Rising awareness from the customer side...
In this paper we describe a novel approach to securely obtain measurements with respect to the integ...
The trustworthiness of microcontroller-class devices is crucial for a growing spectrum of applicatio...
Security in IoT devices is a global topic nowadays. Rising awareness and up-coming regulations will ...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
billion units are already connected and five times more devices are expected to be deployed in the n...
This talk is inspired by a number of presentations I followed in previous years at QA&Test: I believ...
Modern society is increasingly surrounded by, and is growing accustomed to, a wide range of Cyber-Ph...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...