The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved

W Zhou, Y Jia, A Peng, Y Zhang… - IEEE Internet of things …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) is an increasingly popular technology that enables physical devices,
vehicles, home appliances, etc., to communicate and even inter operate with one another. It …

Operating-system controlled network on chip

V Nollet, T Marescaux, D Verkest, JY Mignolet… - Proceedings of the 41st …, 2004 - dl.acm.org
Managing a Network-on-Chip (NoC) in an efficient way is a challenging task. To succeed,
the operating system (OS) needs to be tuned to the capabilities and the needs of the NoC …

{Container-IMA}: A privacy-preserving Integrity Measurement Architecture for Containers

W Luo, Q Shen, Y Xia, Z Wu - … on Research in Attacks, Intrusions and …, 2019 - usenix.org
Container-based virtualization has been widely utilized and brought unprecedented
influence on traditional IT architecture. How to build trust for containers has become an …

[PDF][PDF] Assessing the services, security threats, challenges and solutions in the Internet of Things

SR Zahra, MA Chishti - Scalable Computing: Practice and Experience, 2019 - scpe.org
Scalable Computing: Practice and Experience Volume 20, Number 3, pp. 457–484. http://www.scpe.org
DOI 10.12694/scpe.v20i3.1544 Page 1 Scalable Computing: Practice and Experience …

IPOD2: an irrecoverable and verifiable deletion scheme for outsourced data

X Zhang, Z Chen, X Zhang, Q Shen… - The Computer …, 2024 - academic.oup.com
To alleviate the burden of data storage and management, there is a growing trend of
outsourcing data to the cloud that enables users to remotely manage their data flexibly …

Method and apparatus for providing secure communication among constrained devices

TE Moses - US Patent 10,728,043, 2020 - Google Patents
In one example, an apparatus such as an authorization server and method for secure
communication between constrained devices issues cryptographic communication rights …

Software-based fault recovery via adaptive diversity for COTS multi-core processors

A Höller, T Rauter, J Iber, G Macher… - arXiv preprint arXiv …, 2015 - arxiv.org
The ever growing demands of embedded systems to satisfy high computing performance
and cost efficiency lead to the trend of using commercial off-the-shelf hardware. However …

Property‐based token attestation in mobile computing

TL Vinh, H Cagnon, S Bouzefrane… - Concurrency and …, 2020 - Wiley Online Library
The surge of the presence of personal mobile devices in multi‐environment makes a
significant attention to the mobile cloud computing (MCC). Along with this concern, security …

Integration of integrity enforcing technologies into embedded control devices: experiences and evaluation

T Rauter, A Höller, J Iber, M Krisper… - 2017 IEEE 22nd …, 2017 - ieeexplore.ieee.org
Security is a vital property of SCADA systems, especially in critical infrastructure. An
important aspect is maintaining (sub-) system integrity in networks of embedded control …

A remote-attestation-based extended hash algorithm for privacy protection

Y Zhang, L Wang, Y You, L Yi - 2017 International Conference …, 2017 - ieeexplore.ieee.org
Compared to other remote attestation methods, the binary-based approach is the most direct
and complete one, but privacy protection has become an important problem. In this paper …