On identity, transaction, and smart contract privacy on permissioned and permissionless blockchain: A comprehensive survey

W Liang, Y Liu, C Yang, S Xie, K Li, W Susilo - ACM Computing Surveys, 2024 - dl.acm.org
Blockchain is a decentralized distributed ledger that combines multiple technologies,
including chain data structures, P2P networks, consensus algorithms, cryptography, and …

[HTML][HTML] Systematic review of deep learning solutions for malware detection and forensic analysis in IoT

SU Qureshi, J He, S Tunio, N Zhu, A Nazir… - Journal of King Saud …, 2024 - Elsevier
The swift proliferation of Internet of Things (IoT) devices has presented considerable
challenges in maintaining cybersecurity. As IoT ecosystems expand, they increasingly attract …

Bao: A lightweight static partitioning hypervisor for modern multi-core embedded systems

J Martins, A Tavares, M Solieri… - Workshop on next …, 2020 - drops.dagstuhl.de
Given the increasingly complex and mixed-criticality nature of modern embedded systems,
virtualization emerges as a natural solution to achieve strong spatial and temporal isolation …

{EL3XIR}: Fuzzing {COTS} Secure Monitors

C Lindenmeier, M Payer, M Busch - 33rd USENIX Security Symposium …, 2024 - usenix.org
ARM TrustZone forms the security backbone of mobile devices. TrustZone-based Trusted
Execution Environments (TEEs) facilitate security-sensitive tasks like user authentication …

{SHELTER}: Extending Arm {CCA} with Isolation in User Space

Y Zhang, Y Hu, Z Ning, F Zhang, X Luo… - 32nd USENIX Security …, 2023 - usenix.org
The increasing adoption of confidential computing is providing individual users with a more
seamless interaction with numerous mobile and server devices. TrustZone is a promising …

[HTML][HTML] A survey on the (in) security of trusted execution environments

A Muñoz, R Rios, R Román, J López - Computers & Security, 2023 - Elsevier
As the number of security and privacy attacks continue to grow around the world, there is an
ever increasing need to protect our personal devices. As a matter of fact, more and more …

[PDF][PDF] Cross-Language Attacks.

S Mergendahl, N Burow, H Okhravi - NDSS, 2022 - ndss-symposium.org
Memory corruption attacks against unsafe programming languages like C/C++ have been a
major threat to computer systems for multiple decades. Various sanitizers and runtime …

Sok: Hardware-supported trusted execution environments

M Schneider, RJ Masti, S Shinde, S Capkun… - arXiv preprint arXiv …, 2022 - arxiv.org
The growing complexity of modern computing platforms and the need for strong isolation
protections among their software components has led to the increased adoption of Trusted …

Hardware security for Internet of Things identity assurance

A Cirne, PR Sousa, JS Resende… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
With the proliferation of Internet of Things (IoT) devices, there is an increasing need to
prioritize their security, especially in the context of identity and authentication mechanisms …

Snowboard: Finding kernel concurrency bugs through systematic inter-thread communication analysis

S Gong, D Altinbüken, P Fonseca… - Proceedings of the ACM …, 2021 - dl.acm.org
Kernel concurrency bugs are challenging to find because they depend on very specific
thread interleavings and test inputs. While separately exploring kernel thread interleavings …