We present the experimental evaluation of different security mechanisms applied to persistent state in intermittent computing. Whenever executions become intermittent because of energy scarcity, systems employ persistent state on non-volatile memories (NVMs) to ensure forward progress of applications. Persistent state spans operating system and network stack, as well as applications. While a device is off recharging energy buffers, persistent state on NVMs may be subject to security threats such as stealing sensitive information or tampering with configuration data, which may ultimately corrupt the device state and render the system unusable. Based on modern platforms of the Cortex M*series, we experimentally investigate the impact on typic...
The amount of trust that can be placed in commodity computing platforms is limited by the likelihood...
Energy harvesting has gained significant traction for powering Internet of Things (IoT) and autonomo...
Abstract: As both the number and the complexity of cyber-attacks continuously increase, it is becomi...
We present the experimental evaluation of different security mechanisms applied to persistent state ...
The persistent memory (PM) requires maintaining the crash consistency and encrypting data, to ensure...
Due to their high-density and near-zero leakage power consumption, non-volatile memories (NVMs) are ...
The amount of trust that can be placed in commodity computing platforms is limited by the likelihood...
Phase change memory (PCM) is an emerging memory technol-ogy for future computing systems. Compared t...
Low-power embedded systems exist in many forms. Using batteries for these devices generally imposes ...
Fault-tolerant computer systems are increasingly being used in such applications as e-commerce, bank...
Security is a primary concern in this era of pervasive computing. Hardware based security mechanisms...
Some electronic devices cannot embed any battery because of space- or cost-related concerns. Notably...
Energy harvesting offers the potential for embedded systems to operate without batteries. However, h...
Batteries have traditionally been used to power embedded electronic devices. However, requirements s...
Transiently-powered embedded systems are emerging to enable computation to be sustained during inter...
The amount of trust that can be placed in commodity computing platforms is limited by the likelihood...
Energy harvesting has gained significant traction for powering Internet of Things (IoT) and autonomo...
Abstract: As both the number and the complexity of cyber-attacks continuously increase, it is becomi...
We present the experimental evaluation of different security mechanisms applied to persistent state ...
The persistent memory (PM) requires maintaining the crash consistency and encrypting data, to ensure...
Due to their high-density and near-zero leakage power consumption, non-volatile memories (NVMs) are ...
The amount of trust that can be placed in commodity computing platforms is limited by the likelihood...
Phase change memory (PCM) is an emerging memory technol-ogy for future computing systems. Compared t...
Low-power embedded systems exist in many forms. Using batteries for these devices generally imposes ...
Fault-tolerant computer systems are increasingly being used in such applications as e-commerce, bank...
Security is a primary concern in this era of pervasive computing. Hardware based security mechanisms...
Some electronic devices cannot embed any battery because of space- or cost-related concerns. Notably...
Energy harvesting offers the potential for embedded systems to operate without batteries. However, h...
Batteries have traditionally been used to power embedded electronic devices. However, requirements s...
Transiently-powered embedded systems are emerging to enable computation to be sustained during inter...
The amount of trust that can be placed in commodity computing platforms is limited by the likelihood...
Energy harvesting has gained significant traction for powering Internet of Things (IoT) and autonomo...
Abstract: As both the number and the complexity of cyber-attacks continuously increase, it is becomi...