Software attacks like worm, botnet, and DDoS are the increasingly serious problems in IoT, which had caused large-scale cyber attack and even breakdown of important information infrastructure. Software measurement and attestation are general methods to detect software integrity and their executing states in IoT. However, they cannot resist TOCTOU attack due to their static features and seldom verify correctness of control flow integrity. In this paper, we propose a novel and practical scheme for software trusted execution based on lightweight trust. Our scheme RIPTE combines dynamic measurement and control flow integrity with PUF device binding key. Through encrypting return address of program function by PUF key, RIPTE can protect software...
Remote attestation is a security technique through which a remote trusted party (i.e., Verifier) che...
The Internet of Things (IoT) has increased the connectivity of systems and fueled the digitalization...
In recent years, embedded and cyber-physical systems (CPS), under the guise of Internet-of-Things (I...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...
Code reuse attacks (CRAs), such as return-oriented programming (ROP) and jump-oriented programming (...
Trusted execution environments (TEEs) are on the rise in devices all around us ranging from large-sc...
Abstract: A trusted execution Environment (TEE) could be a comfy place of a computer’s essential pro...
Internet of Things (IoT) device software has to be resistant to faults to ensure data privacy and se...
Nowadays, the growing pervasiveness of digital components and their interconnection in the so-called...
In this paper we describe a novel approach to securely obtain measurements with respect to the integ...
Modern society is increasingly surrounded by, and is growing accustomed to, a wide range of Cyber-Ph...
Internet of Things (IoT) applications are being rapidly deployed in the context of smart homes, auto...
The Internet of Things (IoT) is rapidly evolving, while introducing several new challenges regarding...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
Remote attestation is an important security service that allows a trusted party (verifier) to verify...
Remote attestation is a security technique through which a remote trusted party (i.e., Verifier) che...
The Internet of Things (IoT) has increased the connectivity of systems and fueled the digitalization...
In recent years, embedded and cyber-physical systems (CPS), under the guise of Internet-of-Things (I...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...
Code reuse attacks (CRAs), such as return-oriented programming (ROP) and jump-oriented programming (...
Trusted execution environments (TEEs) are on the rise in devices all around us ranging from large-sc...
Abstract: A trusted execution Environment (TEE) could be a comfy place of a computer’s essential pro...
Internet of Things (IoT) device software has to be resistant to faults to ensure data privacy and se...
Nowadays, the growing pervasiveness of digital components and their interconnection in the so-called...
In this paper we describe a novel approach to securely obtain measurements with respect to the integ...
Modern society is increasingly surrounded by, and is growing accustomed to, a wide range of Cyber-Ph...
Internet of Things (IoT) applications are being rapidly deployed in the context of smart homes, auto...
The Internet of Things (IoT) is rapidly evolving, while introducing several new challenges regarding...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
Remote attestation is an important security service that allows a trusted party (verifier) to verify...
Remote attestation is a security technique through which a remote trusted party (i.e., Verifier) che...
The Internet of Things (IoT) has increased the connectivity of systems and fueled the digitalization...
In recent years, embedded and cyber-physical systems (CPS), under the guise of Internet-of-Things (I...