In the face of an increasing attack landscape, it is necessary to cater for efficient mechanisms to verify software and device integrity for detecting run-time modifications in nextgeneration systems-of-systems. In this context, remote attestation is a promising defense mechanism that allows a third party, the verifier, to ensure a remote device’s configuration integrity and behavioural execution correctness. However, most of the existing families of attestation solutions suffer from the lack of softwarebased mechanisms for the efficient extraction of rigid control-flow information. This limits their applicability to only those cyberphysical systems equipped with additional hardware support. This paper proposes a multi-level execution traci...
The Internet of Things (IoT) is rapidly evolving, while introducing several new challenges regarding...
This poster discusses a strategy for automatic whitelist generation and enforcement using techniques...
A program is a compound of various subroutines playing different roles. In this paper, we study how ...
In the face of an increasing attack landscape, it is necessary to cater for efficient mechanisms to ...
Remote attestation is an excellent approach to confirm the security states of Internet of Things (Io...
Remote attestation (RA) is an effective malware detection mechanism that allows a trusted entity (Ve...
The majority of cloud providers offers users the possibility to deploy Trusted Execution Environment...
With the rapidly evolving next-generation systems- of-systems, we face new security, resilience, and...
Remote attestation, as a challenge-response protocol, enables a trusted entity, called verifier, to ...
Remote attestation provides the basis for one platform to establish trusts on another. In this paper...
Embedded devices are increasingly permeating our environment to collect data and act on the insight ...
Constructing trustworthy computer systems requires validating that every executed piece of code is g...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
The introduction of remote attestation (RA) schemes has allowed academia and industry to enhance the...
The Internet of Things (IoT) is rapidly evolving, while introducing several new challenges regarding...
This poster discusses a strategy for automatic whitelist generation and enforcement using techniques...
A program is a compound of various subroutines playing different roles. In this paper, we study how ...
In the face of an increasing attack landscape, it is necessary to cater for efficient mechanisms to ...
Remote attestation is an excellent approach to confirm the security states of Internet of Things (Io...
Remote attestation (RA) is an effective malware detection mechanism that allows a trusted entity (Ve...
The majority of cloud providers offers users the possibility to deploy Trusted Execution Environment...
With the rapidly evolving next-generation systems- of-systems, we face new security, resilience, and...
Remote attestation, as a challenge-response protocol, enables a trusted entity, called verifier, to ...
Remote attestation provides the basis for one platform to establish trusts on another. In this paper...
Embedded devices are increasingly permeating our environment to collect data and act on the insight ...
Constructing trustworthy computer systems requires validating that every executed piece of code is g...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
The introduction of remote attestation (RA) schemes has allowed academia and industry to enhance the...
The Internet of Things (IoT) is rapidly evolving, while introducing several new challenges regarding...
This poster discusses a strategy for automatic whitelist generation and enforcement using techniques...
A program is a compound of various subroutines playing different roles. In this paper, we study how ...