With the growing popularity of the Internet-of-Things (IoT), massive numbers of specialized devices are deployed worldwide, in many everyday settings, including homes, offices …
Embedded (aka smart or IoT) devices are increasingly popular and becoming ubiquitous. Unsurprisingly, they are also attractive attack targets for exploits and malware. Low-end …
L Zhou, X Ding, F Zhang - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
SGX enclaves prevent external software from accessing their memory. This feature conflicts with legitimate needs for enclave memory introspection, eg, runtime stack collection on an …
Widespread adoption and growing popularity of embedded/IoT/CPS devices make them attractive attack targets. On low-to-mid-range devices, security features are typically few or …
Y Ma, C Yu, C Weng - Computers & Security, 2024 - Elsevier
Hypervisor, the core software in cloud computing, is susceptible to malicious intrusions, potentially jeopardizing overall platform security. Physical hosts within the cloud computing …
M Yu, V Gligor, L Jia - 2021 IEEE Symposium on Security and …, 2021 - ieeexplore.ieee.org
Commodity I/O hardware often fails to separate I/O transfers of isolated OS and applications code. Even when using the best I/O hardware, commodity systems sometimes trade off …
Remote Attestation (RA) is an interaction between a trusted verifier (Vrf) and one or more remote and potentially compromised devices (provers or Prv-s) that allow the former to …
Abstract Internet-of-Things (IoT),“smart”, and Cyber-Physical Systems (CPS) devices have become increasingly popular and commonplace over the past two decades. Some of them …
W Ozga, R Faqeh, DL Quoc, F Gregor… - Proceedings of the 37th …, 2022 - dl.acm.org
High-assurance security systems require strong isolation from the untrusted world to protect the security-sensitive or privacy-sensitive data they process. Existing regulations impose that …