Remote attestation is an excellent approach to confirm the security states of Internet of Things (IoT) devices. It allows an entity (verifier) to validate the integrity of a potentially compromised platform (prover). Most of the current attestation schemes are static, which verify only the software integrity of devices. Recently, some runtime attestation schemes based on the Control Flow Graph (CFG) of the program have been proposed to collect the runtime information. However, the algorithm for constructing CFG only focuses on the rationality of the programs’ control flow, and ignores the possibility that attackers could compromise the control flow of the device by modifying key data. Some mitigation of runtime exploitation technologies tak...
The Internet of Things (IoT) has increased the connectivity of systems and fueled the digitalization...
The expanding attack surface of Internet of Things (IoT) systems calls for innovative security appro...
Remote Attestation (RA) has gained a broad attention over recent years as an essential security mech...
Remote attestation is an excellent approach to confirm the security states of Internet of Things (Io...
The Internet of Things (IoT) is rapidly evolving, while introducing several new challenges regarding...
Remote attestation (RA) is a security mechanism that verifies the trustworthiness of remote IoT devi...
Remote attestation (RA) is an effective malware detection mechanism that allows a trusted entity (Ve...
In the face of an increasing attack landscape, it is necessary to cater for efficient mechanisms to ...
The Internet of things (IoT) are increasingly exposed to a wide range of security threats. Despite t...
Remote attestation is a security technique through which a remote trusted party (i.e., Verifier) che...
The introduction of remote attestation (RA) schemes has allowed academia and industry to enhance the...
Remote attestation has emerged as a valuable security mechanism which aims to verify remotely whethe...
Remote attestation, as a challenge-response protocol, enables a trusted entity, called verifier, to ...
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially cons...
The Internet of Things (IoT) ecosystem comprises billions of heterogeneous Internetconnected devices...
The Internet of Things (IoT) has increased the connectivity of systems and fueled the digitalization...
The expanding attack surface of Internet of Things (IoT) systems calls for innovative security appro...
Remote Attestation (RA) has gained a broad attention over recent years as an essential security mech...
Remote attestation is an excellent approach to confirm the security states of Internet of Things (Io...
The Internet of Things (IoT) is rapidly evolving, while introducing several new challenges regarding...
Remote attestation (RA) is a security mechanism that verifies the trustworthiness of remote IoT devi...
Remote attestation (RA) is an effective malware detection mechanism that allows a trusted entity (Ve...
In the face of an increasing attack landscape, it is necessary to cater for efficient mechanisms to ...
The Internet of things (IoT) are increasingly exposed to a wide range of security threats. Despite t...
Remote attestation is a security technique through which a remote trusted party (i.e., Verifier) che...
The introduction of remote attestation (RA) schemes has allowed academia and industry to enhance the...
Remote attestation has emerged as a valuable security mechanism which aims to verify remotely whethe...
Remote attestation, as a challenge-response protocol, enables a trusted entity, called verifier, to ...
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially cons...
The Internet of Things (IoT) ecosystem comprises billions of heterogeneous Internetconnected devices...
The Internet of Things (IoT) has increased the connectivity of systems and fueled the digitalization...
The expanding attack surface of Internet of Things (IoT) systems calls for innovative security appro...
Remote Attestation (RA) has gained a broad attention over recent years as an essential security mech...