As devices in the Internet of Things (IoT) increase in number and integrate with everyday lives, large amounts of personal information will be generated. With multiple discovered vulnerabilities in current IoT networks, a malicious attacker might be able to get access to and misuse this personal data. Thus, a logger that stores this information securely would make it possible to perform forensic analysis in case of such attacks that target valuable data. In this paper, we propose LogSafe, a scalable, fault-tolerant logger that leverages the use of Intel Software Guard Extensions (SGX) to store logs from IoT devices efficiently and securely. Using the security guarantees of SGX, LogSafe is designed to run on an untrusted cloud infrastructure...
In IT systems, a logfile provides administrators with an audit trail which can be used to review a s...
Abstract: Today, organizations are using IoT devices to accurately collect real data and make better...
International audienceSecurity monitoring is one subdomain of cybersecurity which aims to guarantee ...
As devices in the Internet of Things (IoT) increase in number and integrate with everyday lives, lar...
A logger in the cloud capable of keeping a secure, time-synchronized and tamper-evident log of medic...
International audienceDigital forensics are vital in the Internet of Things (IoT) domain. This is du...
In last years, the security appliance is becoming a more important and critical challenge considerin...
Abstract: The use of Internet of Things devices has lately increased significantly, leading to the m...
With the rapid development of the Internet, Internet of Things (IoT) technology is widely used in pe...
Abstract: A trusted execution Environment (TEE) could be a comfy place of a computer’s essential pro...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...
Trusted execution environments (TEEs) are on the rise in devices all around us ranging from large-sc...
Part 3: Trusted ExecutionInternational audienceRemote mobile and embedded devices are used to delive...
The Internet of Things (IoT) associated with life is a budding real-time environment paradigm. Smart...
The Internet-of-Things (IoT) is the next wave of innovation that promises to improve and optimize ou...
In IT systems, a logfile provides administrators with an audit trail which can be used to review a s...
Abstract: Today, organizations are using IoT devices to accurately collect real data and make better...
International audienceSecurity monitoring is one subdomain of cybersecurity which aims to guarantee ...
As devices in the Internet of Things (IoT) increase in number and integrate with everyday lives, lar...
A logger in the cloud capable of keeping a secure, time-synchronized and tamper-evident log of medic...
International audienceDigital forensics are vital in the Internet of Things (IoT) domain. This is du...
In last years, the security appliance is becoming a more important and critical challenge considerin...
Abstract: The use of Internet of Things devices has lately increased significantly, leading to the m...
With the rapid development of the Internet, Internet of Things (IoT) technology is widely used in pe...
Abstract: A trusted execution Environment (TEE) could be a comfy place of a computer’s essential pro...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...
Trusted execution environments (TEEs) are on the rise in devices all around us ranging from large-sc...
Part 3: Trusted ExecutionInternational audienceRemote mobile and embedded devices are used to delive...
The Internet of Things (IoT) associated with life is a budding real-time environment paradigm. Smart...
The Internet-of-Things (IoT) is the next wave of innovation that promises to improve and optimize ou...
In IT systems, a logfile provides administrators with an audit trail which can be used to review a s...
Abstract: Today, organizations are using IoT devices to accurately collect real data and make better...
International audienceSecurity monitoring is one subdomain of cybersecurity which aims to guarantee ...