A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things

MK Hasan, TM Ghazal, RA Saeed… - IET …, 2022 - Wiley Online Library
The recent advancements of Internet of Things (IoT) embedded systems, wireless networks,
and biosensors those have assisted in the rapid development of implanting wearable …

Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices—A review

T Yaqoob, H Abbas… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Over the last few years, healthcare administrations have been digitizing their provision of
care that led to an increased number of networked medical devices and medical telemetry …

Advances and open problems in federated learning

P Kairouz, HB McMahan, B Avent… - … and trends® in …, 2021 - nowpublishers.com
Federated learning (FL) is a machine learning setting where many clients (eg, mobile
devices or whole organizations) collaboratively train a model under the orchestration of a …

Keystone: An open framework for architecting trusted execution environments

D Lee, D Kohlbrenner, S Shinde, K Asanović… - Proceedings of the …, 2020 - dl.acm.org
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …

An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security

W Iqbal, H Abbas, M Daneshmand… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is transforming everyone's life by providing features, such as
controlling and monitoring of the connected smart objects. IoT applications range over a …

The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved

W Zhou, Y Jia, A Peng, Y Zhang… - IEEE Internet of things …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) is an increasingly popular technology that enables physical devices,
vehicles, home appliances, etc., to communicate and even inter operate with one another. It …

{Graphene-SGX}: A practical library {OS} for unmodified applications on {SGX}

CC Tsai, DE Porter, M Vij - 2017 USENIX Annual Technical Conference …, 2017 - usenix.org
Intel SGX hardware enables applications to protect themselves from potentially-malicious
OSes or hypervisors. In cloud computing and other systems, many users and applications …

[PDF][PDF] T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.

MW Shih, S Lee, T Kim, M Peinado - NDSS, 2017 - ndss-symposium.org
Intel Software Guard Extensions (SGX) is a hardware-based trusted execution environment
(TEE) that enables secure execution of a program in an isolated environment, an enclave …

Telling your secrets without page faults: Stealthy page {Table-Based} attacks on enclaved execution

J Van Bulck, N Weichbrodt, R Kapitza… - 26th USENIX Security …, 2017 - usenix.org
Protected module architectures, such as Intel SGX, enable strong trusted computing
guarantees for hardware-enforced enclaves on top a potentially malicious operating system …

C-FLAT: control-flow attestation for embedded systems software

T Abera, N Asokan, L Davi, JE Ekberg… - Proceedings of the …, 2016 - dl.acm.org
Remote attestation is a crucial security service particularly relevant to increasingly popular
IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a …