International audienceRemote attestation is a protocol to verify that a remote algorithm satisfies security properties, allowing to establish dynamic root of trust. Modern architectures for remote attestation combine signature or MAC primitives with hardware monitors to enforce secret confidentiality. Our works are based on a verified hardware/software co-design for remote attestation, VRASED. Its proof is established using formal methods and its implementation is conducted on a simple embedded device based on a single core microcontroller. A heavy modification of the core, along with a hardware monitor, enforces security properties. We propose to extend this method to microprocessors where cores cannot be modified. In this paper, we tackle...
Remote attestation, as a challenge-response protocol, enables a trusted entity, called verifier, to ...
The Internet of things (IoT) are increasingly exposed to a wide range of security threats. Despite t...
We present an attestation mechanism that enables a remote verifier to implicitly evaluate the trustw...
Embedded systems are increasingly pervasive, interdependent and in many cases critical to our every ...
Embedded computing devices increasingly permeate many aspects of modern life: from medical to automo...
Large distributed systems, like Industrial Control Systems, should be able to verify that devices th...
Security of embedded devices is a timely and important issue, due to the proliferation of these devi...
As the complexity of current software systems increases, we see a correlative increase in the number...
Security of embedded devices is a timely and important issue, due to their proliferation into numero...
Remote attestation is a mechanism to securely and verifiably obtain information about the state of a...
Embedded computing devices (such as actuators, controllers and sensors of various sizes) increasingl...
A technology called Trusted Computing (TC), helps building trust relationships between devices. Deve...
Remote attestation in embedded devices is a service that allows a verifier to check the internal sta...
Abstract. Remote attestation is the process of verifying internal state of a remote embedded device....
In recent years, embedded and cyber-physical systems (CPS), under the guise of Internet-of-Things (I...
Remote attestation, as a challenge-response protocol, enables a trusted entity, called verifier, to ...
The Internet of things (IoT) are increasingly exposed to a wide range of security threats. Despite t...
We present an attestation mechanism that enables a remote verifier to implicitly evaluate the trustw...
Embedded systems are increasingly pervasive, interdependent and in many cases critical to our every ...
Embedded computing devices increasingly permeate many aspects of modern life: from medical to automo...
Large distributed systems, like Industrial Control Systems, should be able to verify that devices th...
Security of embedded devices is a timely and important issue, due to the proliferation of these devi...
As the complexity of current software systems increases, we see a correlative increase in the number...
Security of embedded devices is a timely and important issue, due to their proliferation into numero...
Remote attestation is a mechanism to securely and verifiably obtain information about the state of a...
Embedded computing devices (such as actuators, controllers and sensors of various sizes) increasingl...
A technology called Trusted Computing (TC), helps building trust relationships between devices. Deve...
Remote attestation in embedded devices is a service that allows a verifier to check the internal sta...
Abstract. Remote attestation is the process of verifying internal state of a remote embedded device....
In recent years, embedded and cyber-physical systems (CPS), under the guise of Internet-of-Things (I...
Remote attestation, as a challenge-response protocol, enables a trusted entity, called verifier, to ...
The Internet of things (IoT) are increasingly exposed to a wide range of security threats. Despite t...
We present an attestation mechanism that enables a remote verifier to implicitly evaluate the trustw...