With the proliferation of cheap bulk SSD storage and better batteries in the last few years we are experiencing an explosion in the number of Internet of Things (IoT) devices flooding the market, smartphone connected point-of-sale devices (e.g. Square), home monitoring devices (e.g. NEST), fitness monitoring devices (e.g. Fitbit), and smart-watches. With new IoT devices come new security threats that have yet to be adequately evaluated. We propose uLeech, a new embedded trusted platform module for next-generation power scavenging devices. Such power scavenging devices are already widely deployed. For instance, the Square point-of-sale reader uses the microphone/speaker interface of a smartphone for communications and as a pow...
Internet of Things (IoT) is a network of devices that are connected through the Internet to exchange...
Traditionally, most cryptographic algorithms were executed on server computers with high computation...
Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, observations of le...
Security in Internet of Things (IoT) applications is more important than ever. New devices are pushe...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
This decade has already seen a significant surge in the number of cyber attacks. With the exponentia...
The security of Internet of Things (IoT) devices relies on fundamental concepts such as cryptographi...
The advancement of digital silicon technology brings a variety of novel embedded systems to our dail...
With the explosion in the number of internet of things (IoT) devices in recent years, the security o...
The threat of side-channels is becoming increasingly prominent for resource-constrained internet-con...
Presented on November 8, 2019 at 12:00 p.m. in the Krone Engineered Biosystems Building, Room 1005.N...
The emergent next generation of computing, the so-called Internet of Things (IoT), presents signific...
Contains fulltext : 283342.pdf (Publisher’s version ) (Open Access)Embedded system...
The Internet of Things (IoT) has become a reality: small connected devices feature in everyday objec...
Mobile appliances and especially smart cards have found more and more applications in the past two d...
Internet of Things (IoT) is a network of devices that are connected through the Internet to exchange...
Traditionally, most cryptographic algorithms were executed on server computers with high computation...
Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, observations of le...
Security in Internet of Things (IoT) applications is more important than ever. New devices are pushe...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
This decade has already seen a significant surge in the number of cyber attacks. With the exponentia...
The security of Internet of Things (IoT) devices relies on fundamental concepts such as cryptographi...
The advancement of digital silicon technology brings a variety of novel embedded systems to our dail...
With the explosion in the number of internet of things (IoT) devices in recent years, the security o...
The threat of side-channels is becoming increasingly prominent for resource-constrained internet-con...
Presented on November 8, 2019 at 12:00 p.m. in the Krone Engineered Biosystems Building, Room 1005.N...
The emergent next generation of computing, the so-called Internet of Things (IoT), presents signific...
Contains fulltext : 283342.pdf (Publisher’s version ) (Open Access)Embedded system...
The Internet of Things (IoT) has become a reality: small connected devices feature in everyday objec...
Mobile appliances and especially smart cards have found more and more applications in the past two d...
Internet of Things (IoT) is a network of devices that are connected through the Internet to exchange...
Traditionally, most cryptographic algorithms were executed on server computers with high computation...
Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, observations of le...