Keystone: An open framework for architecting trusted execution environments

D Lee, D Kohlbrenner, S Shinde, K Asanović… - Proceedings of the …, 2020 - dl.acm.org
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …

Formal approaches to secure compilation: A survey of fully abstract compilation and related work

M Patrignani, A Ahmed, D Clarke - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Secure compilation is a discipline aimed at developing compilers that preserve the security
properties of the source programs they take as input in the target programs they produce as …

Collective remote attestation at the Internet of Things scale: State-of-the-art and future challenges

M Ambrosin, M Conti, R Lazzeretti… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
In recent years, the booming of Internet of Things (IoT) has populated the world with billions
of smart devices that implement novel services and applications. The potential for …

The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved

W Zhou, Y Jia, A Peng, Y Zhang… - IEEE Internet of things …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) is an increasingly popular technology that enables physical devices,
vehicles, home appliances, etc., to communicate and even inter operate with one another. It …

C-FLAT: control-flow attestation for embedded systems software

T Abera, N Asokan, L Davi, JE Ekberg… - Proceedings of the …, 2016 - dl.acm.org
Remote attestation is a crucial security service particularly relevant to increasingly popular
IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a …

TrustLite: A security architecture for tiny embedded devices

P Koeberl, S Schulz, AR Sadeghi… - Proceedings of the Ninth …, 2014 - dl.acm.org
Embedded systems are increasingly pervasive, interdependent and in many cases critical to
our every day life and safety. Tiny devices that cannot afford sophisticated hardware security …

Security and privacy challenges in industrial internet of things

AR Sadeghi, C Wachsmann, M Waidner - Proceedings of the 52nd …, 2015 - dl.acm.org
Today, embedded, mobile, and cyberphysical systems are ubiquitous and used in many
applications, from industrial control systems, modern vehicles, to critical infrastructure …

Security vulnerabilities of internet of things: A case study of the smart plug system

Z Ling, J Luo, Y Xu, C Gao, K Wu… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
With the rapid development of the Internet of Things, more and more small devices are
connected into the Internet for monitoring and control purposes. One such type of devices …

{CURE}: A security architecture with {CUstomizable} and resilient enclaves

R Bahmani, F Brasser, G Dessouky… - 30th USENIX Security …, 2021 - usenix.org
Security architectures providing Trusted Execution Environments (TEEs) have been an
appealing research subject for a wide range of computer systems, from low-end embedded …

TyTAN: Tiny trust anchor for tiny devices

F Brasser, B El Mahjoub, AR Sadeghi… - Proceedings of the …, 2015 - dl.acm.org
Embedded systems are at the core of many security-sensitive and safety-critical
applications, including automotive, industrial control systems, and critical infrastructures …