Sok: Blockchain light clients

P Chatzigiannis, F Baldimtsi, K Chalkias - International Conference on …, 2022 - Springer
Blockchain systems, as append-only ledgers, are typically associated with linearly growing
participation costs. Therefore, for a blockchain client to interact with the system (query or …

Privacy-from-birth: Protecting sensed data from malicious sensors with VERSA

IDO Nunes, S Hwang, S Jakkamsetti… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
With the growing popularity of the Internet-of-Things (IoT), massive numbers of specialized
devices are deployed worldwide, in many everyday settings, including homes, offices …

{GAROTA}: generalized active {Root-Of-Trust} architecture (for tiny embedded devices)

E Aliaj, IDO Nunes, G Tsudik - 31st USENIX Security Symposium …, 2022 - usenix.org
Embedded (aka smart or IoT) devices are increasingly popular and becoming ubiquitous.
Unsurprisingly, they are also attractive attack targets for exploits and malware. Low-end …

Smile: Secure memory introspection for live enclave

L Zhou, X Ding, F Zhang - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
SGX enclaves prevent external software from accessing their memory. This feature conflicts
with legitimate needs for enclave memory introspection, eg, runtime stack collection on an …

: Towards a Verified Root-of-Trust Over seL4

IDO Nunes, S Hwang, S Jakkamsetti… - 2023 IEEE/ACM …, 2023 - ieeexplore.ieee.org
Widespread adoption and growing popularity of embedded/IoT/CPS devices make them
attractive attack targets. On low-to-mid-range devices, security features are typically few or …

Morpheus: An efficient timing-based attestation framework for safeguarding hypervisor integrity with dynamic trust

Y Ma, C Yu, C Weng - Computers & Security, 2024 - Elsevier
Hypervisor, the core software in cloud computing, is susceptible to malicious intrusions,
potentially jeopardizing overall platform security. Physical hosts within the cloud computing …

An I/O separation model for formal verification of kernel implementations

M Yu, V Gligor, L Jia - 2021 IEEE Symposium on Security and …, 2021 - ieeexplore.ieee.org
Commodity I/O hardware often fails to separate I/O transfers of isolated OS and applications
code. Even when using the best I/O hardware, commodity systems sometimes trade off …

Delegated attestation: scalable remote attestation of commodity cps by blending proofs of execution with software attestation

M Ammar, B Crispo, I De Oliveira Nunes… - Proceedings of the 14th …, 2021 - dl.acm.org
Remote Attestation (RA) is an interaction between a trusted verifier (Vrf) and one or more
remote and potentially compromised devices (provers or Prv-s) that allow the former to …

[图书][B] Root-of-trust architectures for low-end embedded systems

S Jakkamsetti - 2023 - search.proquest.com
Abstract Internet-of-Things (IoT),“smart”, and Cyber-Physical Systems (CPS) devices have
become increasingly popular and commonplace over the past two decades. Some of them …

Chors: Hardening high-assurance security systems with trusted computing

W Ozga, R Faqeh, DL Quoc, F Gregor… - Proceedings of the 37th …, 2022 - dl.acm.org
High-assurance security systems require strong isolation from the untrusted world to protect
the security-sensitive or privacy-sensitive data they process. Existing regulations impose that …