As the number of so-called Internet-of-Things is continuously rising and the urge for regular hardware updates has never been higher, the security of our smart objects all around us is often skipped due to lack of development time. By default, these devices are equipped with a primitive bootloader, which is executing code located at a designated address. Within this document, we are describing a simple but worthwhile validation mechanism, which is realized by using digital signature algorithm included in the bootloader. As a result, we are making sure that no malicious code or malware can be executed and the running application is originating from a trusted and known developer. Nevertheless, even the strongest cryptographic system cannot en...
We introduce the Syracuse Assured Boot Loader Executive (SABLE), a trustworthy secure loader. A trus...
Many embedded systems are complex, and it is often required that the firmware in these systems are u...
This thesis deals with the analysis and design of trusted computing platforms. Trusted computing tec...
The Internet of Things has a bootloader and applications responsible for initializing the device’s h...
In this paper we describe bugs and ways to attack trusted computing systems based on a static root o...
Embedded systems are single purpose devices, where software updates are often omitted or very limite...
International audienceThe fault of one device on a grid may incur severe economical or physical dama...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
Firmware refers to device read-only resident code which includes microcode and macro-instruction-lev...
Modern computer systems have critical security problems because of two wrong assumptions security sy...
International audienceBoot firmware, like UEFI-compliant firmware, has been the target of numerous a...
A firmware encryption for embedded devices can prevent the firmware from being read out to clone the...
This research provides a set of methods, tools and design guidelines that help a designer to constr...
Secure embedded bootloaders are the trust anchors for modern vehicles’ software. The secure software...
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeab...
We introduce the Syracuse Assured Boot Loader Executive (SABLE), a trustworthy secure loader. A trus...
Many embedded systems are complex, and it is often required that the firmware in these systems are u...
This thesis deals with the analysis and design of trusted computing platforms. Trusted computing tec...
The Internet of Things has a bootloader and applications responsible for initializing the device’s h...
In this paper we describe bugs and ways to attack trusted computing systems based on a static root o...
Embedded systems are single purpose devices, where software updates are often omitted or very limite...
International audienceThe fault of one device on a grid may incur severe economical or physical dama...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
Firmware refers to device read-only resident code which includes microcode and macro-instruction-lev...
Modern computer systems have critical security problems because of two wrong assumptions security sy...
International audienceBoot firmware, like UEFI-compliant firmware, has been the target of numerous a...
A firmware encryption for embedded devices can prevent the firmware from being read out to clone the...
This research provides a set of methods, tools and design guidelines that help a designer to constr...
Secure embedded bootloaders are the trust anchors for modern vehicles’ software. The secure software...
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeab...
We introduce the Syracuse Assured Boot Loader Executive (SABLE), a trustworthy secure loader. A trus...
Many embedded systems are complex, and it is often required that the firmware in these systems are u...
This thesis deals with the analysis and design of trusted computing platforms. Trusted computing tec...