Guaranteeing runtime integrity of embedded system software is an open problem. Trade-offs between security and other priorities (e.g., cost or performance) are inherent, and resolving them is both challenging and important. The proliferation of runtime attacks that introduce malicious code (e.g., by injection) into embedded devices has prompted a range of mitigation techniques. One popular approach is Remote Attestation (RA), whereby a trusted entity (verifier) checks the current software state of an untrusted remote device (prover). RA yields a timely authenticated snapshot of prover state that verifier uses to decide whether an attack occurred. Current RA schemes require verifier to explicitly initiate RA, based on some unclear criteria...
Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent et al. ...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
The amount of trust that can be placed in commodity computing platforms is limited by the likelihood...
Small integrated computers, so-called embedded systems, have become a ubiquitous and indispensable p...
Embedded computing devices (such as actuators, controllers and sensors of various sizes) increasingl...
Modern society is increasingly surrounded by, and is growing accustomed to, a wide range of Cyber-Ph...
Abstract. Remote attestation is the process of verifying internal state of a remote embedded device....
Security of embedded devices is a timely and important issue, due to their proliferation into numero...
Security of embedded devices is a timely and important issue, due to the proliferation of these devi...
The explosive growth of networked embedded systems has made ubiquitous and pervasive computing a rea...
Embedded computing devices increasingly permeate many aspects of modern life: from medical to automo...
Remote attestation is the process of securely veri-fying internal state of a remote hardware platfor...
Attestation is a fundamental building block to establish trust over software systems. When used in c...
Remote attestation is an important security service that allows a trusted party (verifier) to verify...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent et al. ...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
The amount of trust that can be placed in commodity computing platforms is limited by the likelihood...
Small integrated computers, so-called embedded systems, have become a ubiquitous and indispensable p...
Embedded computing devices (such as actuators, controllers and sensors of various sizes) increasingl...
Modern society is increasingly surrounded by, and is growing accustomed to, a wide range of Cyber-Ph...
Abstract. Remote attestation is the process of verifying internal state of a remote embedded device....
Security of embedded devices is a timely and important issue, due to their proliferation into numero...
Security of embedded devices is a timely and important issue, due to the proliferation of these devi...
The explosive growth of networked embedded systems has made ubiquitous and pervasive computing a rea...
Embedded computing devices increasingly permeate many aspects of modern life: from medical to automo...
Remote attestation is the process of securely veri-fying internal state of a remote hardware platfor...
Attestation is a fundamental building block to establish trust over software systems. When used in c...
Remote attestation is an important security service that allows a trusted party (verifier) to verify...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent et al. ...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
The amount of trust that can be placed in commodity computing platforms is limited by the likelihood...