In this paper we propose Sancus, a security architecture for networked embedded devices. Sancus supports extensibility in the form of remote (even third-party) software installation on devices while maintaining strong security guarantees. More specifically, Sancus can remotely attest to a software provider that a specific software module is running uncompromised, and can authenticate messages from software modules to software providers. Software modules can securely maintain local state, and can securely interact with other software modules that they choose to trust. The most distinguishing feature of Sancus is that it achieves these security guarantees without trusting any infrastructural software on the device. The Trusted Computing Base ...
In this paper, we present SobTrA, a Software-based Trust Anchor for ARM Cortex-A processors to prote...
This paper presents an approach to provide strong assurance of the secure execution of distributed e...
© 2018 IEEE. During the secure boot process for a trusted execution environment, the processor must ...
The Sancus security architecture for networked embedded devices was proposed in 2013 at the USENIX S...
© IFIP International Federation for Information Processing 2015. Low-end embedded devices and the In...
Part 2: Secure Resource Sharing and Access ControlInternational audienceLow-end embedded devices and...
In this paper we describe a novel approach to securely obtain measurements with respect to the integ...
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a v...
Embedded systems are increasingly pervasive, interdependent and in many cases critical to our every ...
The electronics industry is incredibly fast-moving and has greatly impacted our society. One of its ...
This talk is inspired by a number of presentations I followed in previous years at QA&Test: I believ...
Trusted computing is an emerging technology to improve the trustworthiness of computing platforms. T...
Modern society is increasingly surrounded by, and is growing accustomed to, a wide range of Cyber-Ph...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
Many corporations, private organizations, and government agencies maintain sensitive data that must ...
In this paper, we present SobTrA, a Software-based Trust Anchor for ARM Cortex-A processors to prote...
This paper presents an approach to provide strong assurance of the secure execution of distributed e...
© 2018 IEEE. During the secure boot process for a trusted execution environment, the processor must ...
The Sancus security architecture for networked embedded devices was proposed in 2013 at the USENIX S...
© IFIP International Federation for Information Processing 2015. Low-end embedded devices and the In...
Part 2: Secure Resource Sharing and Access ControlInternational audienceLow-end embedded devices and...
In this paper we describe a novel approach to securely obtain measurements with respect to the integ...
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a v...
Embedded systems are increasingly pervasive, interdependent and in many cases critical to our every ...
The electronics industry is incredibly fast-moving and has greatly impacted our society. One of its ...
This talk is inspired by a number of presentations I followed in previous years at QA&Test: I believ...
Trusted computing is an emerging technology to improve the trustworthiness of computing platforms. T...
Modern society is increasingly surrounded by, and is growing accustomed to, a wide range of Cyber-Ph...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
Many corporations, private organizations, and government agencies maintain sensitive data that must ...
In this paper, we present SobTrA, a Software-based Trust Anchor for ARM Cortex-A processors to prote...
This paper presents an approach to provide strong assurance of the secure execution of distributed e...
© 2018 IEEE. During the secure boot process for a trusted execution environment, the processor must ...