Part 7: TPM and Internet of ThingsInternational audienceA central aspect for securing connected embedded systems are remote firmware upgrades to deal with vulnerabilities discovered after deployment. In many scenarios, Hardware Security Modules such as the Trusted Computing Group’s Trusted Platform Module (TPM) 2.0 are used as a security-anchor in embedded systems. In this paper, we discuss the benefits of TPM 2.0 for securing embedded systems and present a concept for advanced remote firmware upgrade of an embedded system with enforcement of Intellectual Property Rights and Privacy protection of device-resident data (i.e., data that remains on the device during the flashing process). This concept utilizes unique features of TPM 2.0. Furthe...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a v...
Many embedded systems are complex, and it is often required that the firmware in these systems are u...
A central aspect for securing connected embedded systems are remote firmware upgrades to deal with v...
Firmware refers to device read-only resident code which includes microcode and macro-instruction-lev...
The ability to update firmware in embedded systems allows end-users to patch device vulnerabilities ...
MasterAs the embedded system is applied in various fields, the rate of use of smart devices such as ...
International audienceFirmware updates on embedded systems are essential for patching vulnerabilitie...
Runtime firmware product lines enable the generation of unified firmware images, i.e., a single firm...
Given the growing importance of Information Technology in todays vehicles with their ever increasing...
The Trusted Platform Module is a specific purpose embedded chip built to bridge the gap between a pu...
With the increasing day-to-day acceptance of IOT computing, the issues related to it are also gettin...
Abstract Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard ...
The Trusted Platform Module (TPM) currently used by PCs is not suitable for embedded systems, it is ...
Linux-based Edge Gateways that connects hundreds or maybe thousands of IoT devices, are exposed to v...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a v...
Many embedded systems are complex, and it is often required that the firmware in these systems are u...
A central aspect for securing connected embedded systems are remote firmware upgrades to deal with v...
Firmware refers to device read-only resident code which includes microcode and macro-instruction-lev...
The ability to update firmware in embedded systems allows end-users to patch device vulnerabilities ...
MasterAs the embedded system is applied in various fields, the rate of use of smart devices such as ...
International audienceFirmware updates on embedded systems are essential for patching vulnerabilitie...
Runtime firmware product lines enable the generation of unified firmware images, i.e., a single firm...
Given the growing importance of Information Technology in todays vehicles with their ever increasing...
The Trusted Platform Module is a specific purpose embedded chip built to bridge the gap between a pu...
With the increasing day-to-day acceptance of IOT computing, the issues related to it are also gettin...
Abstract Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard ...
The Trusted Platform Module (TPM) currently used by PCs is not suitable for embedded systems, it is ...
Linux-based Edge Gateways that connects hundreds or maybe thousands of IoT devices, are exposed to v...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a v...
Many embedded systems are complex, and it is often required that the firmware in these systems are u...