Detecting compromised IoT devices: Existing techniques, challenges, and a way forward

I Makhdoom, M Abolhasan, D Franklin, J Lipman… - Computers & …, 2023 - Elsevier
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …

Collective remote attestation at the Internet of Things scale: State-of-the-art and future challenges

M Ambrosin, M Conti, R Lazzeretti… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
In recent years, the booming of Internet of Things (IoT) has populated the world with billions
of smart devices that implement novel services and applications. The potential for …

An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security

W Iqbal, H Abbas, M Daneshmand… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is transforming everyone's life by providing features, such as
controlling and monitoring of the connected smart objects. IoT applications range over a …

A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects

B Kuang, A Fu, W Susilo, S Yu, Y Gao - Computers & Security, 2022 - Elsevier
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially
considering the fact that 5G technology facilitates numerous services building on IoT …

A survey on internet of things security from data perspectives

J Hou, L Qu, W Shi - Computer Networks, 2019 - Elsevier
Abstract As the Internet of Things (IoT) sees an increasing use in the society, the security
challenge it faces is becoming more and more severe. Data collected and shared in the IoT …

Litehax: lightweight hardware-assisted attestation of program execution

G Dessouky, T Abera, A Ibrahim… - 2018 IEEE/ACM …, 2018 - ieeexplore.ieee.org
Unlike traditional processors, embedded Internet of Things (IoT) devices lack resources to
incorporate protection against modern sophisticated attacks resulting in critical …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS

W Feng, Y Qin, S Zhao, D Feng - Computer Networks, 2018 - Elsevier
With the rise of Internet of Things (IoT) and Cyber-Physical Systems (CPS), the need for
smart embedded devices is rapidly increasing, and so does the security and privacy risk …

SARA: Secure asynchronous remote attestation for IoT systems

E Dushku, MM Rabbani, M Conti… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Remote attestation has emerged as a valuable security mechanism which aims to verify
remotely whether or not a potentially untrusted device has been compromised. The …

On the TOCTOU problem in remote attestation

I De Oliveira Nunes, S Jakkamsetti… - Proceedings of the …, 2021 - dl.acm.org
Much attention has been devoted to verifying software integrity of remote embedded (IoT)
devices. Many techniques, with different assumptions and security guarantees, have been …