{APEX}: A verified architecture for proofs of execution on remote devices under full software compromise

IDO Nunes, K Eldefrawy, N Rattanavipanon… - 29th USENIX Security …, 2020 - usenix.org
Modern society is increasingly surrounded by, and is growing accustomed to, a wide range
of Cyber-Physical Systems (CPS), Internet-of-Things (IoT), and smart devices. They often …

{GAROTA}: generalized active {Root-Of-Trust} architecture (for tiny embedded devices)

E Aliaj, IDO Nunes, G Tsudik - 31st USENIX Security Symposium …, 2022 - usenix.org
Embedded (aka smart or IoT) devices are increasingly popular and becoming ubiquitous.
Unsurprisingly, they are also attractive attack targets for exploits and malware. Low-end …

[PDF][PDF] IDA: Hybrid Attestation with Support for Interrupts and TOCTOU

F Arkannezhad, J Feng… - Network and Distributed …, 2024 - ndss-symposium.org
Remote attestation has received much attention recently due to the proliferation of
embedded and IoT devices. Among various solutions, methods based on hardware-software …

Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence

S Jakkamsetti, Y Kim, G Tsudik - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
As many types of IoT devices worm their way into numerous settings and many aspects of
our daily lives, awareness of their presence and functionality becomes a source of major …

Towards Secure Runtime Auditing of Remote Embedded System Software

A Caulfield - Proceedings of the 2024 on ACM SIGSAC Conference …, 2024 - dl.acm.org
Low-cost and energy-efficient microcontroller units (MCUs) increasingly perform critical
tasks at the edge of modern systems despite their inherent vulnerabilities. To assess their …

[图书][B] Root-of-trust architectures for low-end embedded systems

S Jakkamsetti - 2023 - search.proquest.com
Abstract Internet-of-Things (IoT),“smart”, and Cyber-Physical Systems (CPS) devices have
become increasingly popular and commonplace over the past two decades. Some of them …

GAROTA: generalized active root-of-trust architecture

E Aliaj, IDO Nunes, G Tsudik - arXiv preprint arXiv:2102.07014, 2021 - arxiv.org
In this paper, we set out to systematically design a minimal active RoT for tiny low-end MCU-
s. We begin with the following questions:(1) What functions and hardware support are …

Poisoning Prevention in Federated Learning and Differential Privacy via Stateful Proofs of Execution

N Rattanavipanon, IDO Nunes - arXiv preprint arXiv:2404.06721, 2024 - arxiv.org
The rise in IoT-driven distributed data analytics, coupled with increasing privacy concerns,
has led to a demand for effective privacy-preserving and federated data collection/model …

Towards End-to-End Data Privacy: from Generation to Consumption

S Hwang - 2024 - search.proquest.com
Preserving data privacy is a formidable challenge in today's interconnected and data-centric
world. Individuals are surrounded by “smart” devices that collect and generate massive …

Convincing Without Revealing: Strategies for Facilitating Remote Attestation under Weakened Trust Assumptions using Privacy-Enhancing Technologies

HB Debes - 2022 - orbit.dtu.dk
Remote attestation is the process in which one computing system, known as the prover,
supplies evidence about some claim to another computing system, known as the verifier …