Detecting compromised IoT devices: Existing techniques, challenges, and a way forward

I Makhdoom, M Abolhasan, D Franklin, J Lipman… - Computers & …, 2023 - Elsevier
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …

Towards developing high performance RISC-V processors using agile methodology

Y Xu, Z Yu, D Tang, G Chen, L Chen… - 2022 55th IEEE/ACM …, 2022 - ieeexplore.ieee.org
While research has shown that the agile chip design methodology is promising to sustain
the scaling of computing performance in a more efficient way, it is still of limited usage in …

A survey on risc-v security: Hardware and architecture

T Lu - arXiv preprint arXiv:2107.04175, 2021 - arxiv.org
The Internet of Things (IoT) is an ongoing technological revolution. Embedded processors
are the processing engines of smart IoT devices. For decades, these processors were …

Teesec: Pre-silicon vulnerability discovery for trusted execution environments

M Ghaniyoun, K Barber, Y Xiao, Y Zhang… - Proceedings of the 50th …, 2023 - dl.acm.org
Trusted execution environments (TEE) are CPU hardware extensions that provide security
guarantees for applications running on untrusted operating systems. The security of TEEs is …

Towards a formally verified security monitor for VM-based confidential computing

W Ozga - Proceedings of the 12th International Workshop on …, 2023 - dl.acm.org
Confidential computing is a key technology for isolating high-assurance applications from
the large amounts of untrusted code typical in modern systems. Existing confidential …

Sok: Limitations of confidential computing via tees for high-performance compute systems

A Akram, V Akella, S Peisert… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Trusted execution environments (TEEs) are primary enablers of confidential computing. This
paper presents a systematization of the existing trusted execution environments in industry …

Formalizing, verifying and applying ISA security guarantees as universal contracts

S Huyghebaert, S Keuchel, C De Roover… - Proceedings of the 2023 …, 2023 - dl.acm.org
Progress has recently been made on specifying instruction set architectures (ISAs) in
executable formalisms rather than through prose. However, to date, those formal …

ShieLD: Shielding Cross-zone Communication within Limited-resourced IoT Devices running Vulnerable Software Stack

A Khurshid, SD Yalew, M Aslam… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Securing IoT devices is gaining attention as the security risks associated with these devices
increase rapidly. TrustZone-M, a Trusted Execution Environment (TEE) for Cortex-M …

Security Challenges Faced by RISC-V open-source Processors and its Security Features: A Survey

M Masood, Y Asfia, SG Khawaja - 2023 25th International …, 2023 - ieeexplore.ieee.org
RISC-V, an open-source instruction set architecture (ISA), presents unique security
dynamics due to its transparent development model. This survey illuminates the principal …

Formal Verification of Security Properties on RISC-V Processors

CS Chuah, C Appold, T Leinmueller - Proceedings of the 21st ACM-IEEE …, 2023 - dl.acm.org
Hardware Security and trustworthiness are becoming ever more important, especially for
security-critical applications like autonomous driving and service robots. With the increase in …