Detecting compromised IoT devices: Existing techniques, challenges, and a way forward

I Makhdoom, M Abolhasan, D Franklin, J Lipman… - Computers & …, 2023 - Elsevier
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …

Collective remote attestation at the Internet of Things scale: State-of-the-art and future challenges

M Ambrosin, M Conti, R Lazzeretti… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
In recent years, the booming of Internet of Things (IoT) has populated the world with billions
of smart devices that implement novel services and applications. The potential for …

A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects

B Kuang, A Fu, W Susilo, S Yu, Y Gao - Computers & Security, 2022 - Elsevier
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially
considering the fact that 5G technology facilitates numerous services building on IoT …

SARA: Secure asynchronous remote attestation for IoT systems

E Dushku, MM Rabbani, M Conti… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Remote attestation has emerged as a valuable security mechanism which aims to verify
remotely whether or not a potentially untrusted device has been compromised. The …

Verify&revive: Secure detection and recovery of compromised low-end embedded devices

M Ammar, B Crispo - Proceedings of the 36th Annual Computer Security …, 2020 - dl.acm.org
Tiny and specialized computing platforms, so-called embedded or Internet of Things (IoT)
devices, are increasingly used in safety-and privacy-critical application scenarios. A …

Traces: Tee-based runtime auditing for commodity embedded systems

A Caulfield, AJ Neto, N Rattanavipanon… - arXiv preprint arXiv …, 2024 - arxiv.org
Control Flow Attestation (CFA) offers a means to detect control flow hijacking attacks on
remote devices, enabling verification of their runtime trustworthiness. CFA generates a trace …

A taxonomy and review of remote attestation schemes in embedded systems

WA Johnson, S Ghafoor, S Prowell - IEEE Access, 2021 - ieeexplore.ieee.org
Embedded systems that make up the Internet of Things (IoT), Supervisory Control and Data
Acquisition (SCADA) networks, and Smart Grid applications are coming under increasing …

D2Gen: a decentralized device genome based integrity verification mechanism for collaborative intrusion detection systems

I Makhdoom, K Hayawi, M Kaosar, SS Mathew… - IEEE …, 2021 - ieeexplore.ieee.org
Collaborative Intrusion Detection Systems are considered an effective defense mechanism
for large, intricate, and multilayered Industrial Internet of Things against many cyberattacks …

Swarm-Net: Firmware Attestation in IoT Swarms using Graph Neural Networks and Volatile Memory

V Kohli, B Kohli, MN Aman… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Despite large-scale deployment, studies have highlighted critical security concerns in IoT
networks, many of which stem from firmware-related issues. Furthermore, IoT swarms have …

Care: Lightweight attack resilient secure boot architecture with onboard recovery for risc-v based soc

A Dave, N Banerjee, C Patel - 2021 22nd International …, 2021 - ieeexplore.ieee.org
Recent technological advancements have proliferated the use of small embedded devices
for collecting, processing, and transferring the security-critical information. The Internet of …