Detecting compromised IoT devices: Existing techniques, challenges, and a way forward

I Makhdoom, M Abolhasan, D Franklin, J Lipman… - Computers & …, 2023 - Elsevier
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …

Collective remote attestation at the Internet of Things scale: State-of-the-art and future challenges

M Ambrosin, M Conti, R Lazzeretti… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
In recent years, the booming of Internet of Things (IoT) has populated the world with billions
of smart devices that implement novel services and applications. The potential for …

A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects

B Kuang, A Fu, W Susilo, S Yu, Y Gao - Computers & Security, 2022 - Elsevier
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially
considering the fact that 5G technology facilitates numerous services building on IoT …

{VRASED}: A verified {Hardware/Software}{Co-Design} for remote attestation

IDO Nunes, K Eldefrawy, N Rattanavipanon… - 28th USENIX Security …, 2019 - usenix.org
Remote Attestation (RA) is a distinct security service that allows a trusted verifier (Vrf) to
measure the software state of an untrusted remote prover (Prv). If correctly implemented, RA …

WaTZ: A trusted WebAssembly runtime environment with remote attestation for TrustZone

J Ménétrey, M Pasin, P Felber… - 2022 IEEE 42nd …, 2022 - ieeexplore.ieee.org
WebAssembly (Wasm) is a novel low-level bytecode format that swiftly gained popularity for
its efficiency, versatility and security, with near-native performance. Besides, trusted …

SARA: Secure asynchronous remote attestation for IoT systems

E Dushku, MM Rabbani, M Conti… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Remote attestation has emerged as a valuable security mechanism which aims to verify
remotely whether or not a potentially untrusted device has been compromised. The …

On the TOCTOU problem in remote attestation

I De Oliveira Nunes, S Jakkamsetti… - Proceedings of the …, 2021 - dl.acm.org
Much attention has been devoted to verifying software integrity of remote embedded (IoT)
devices. Many techniques, with different assumptions and security guarantees, have been …

ESDRA: An efficient and secure distributed remote attestation scheme for IoT swarms

B Kuang, A Fu, S Yu, G Yang, M Su… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
An Internet of Things (IoT) system generally contains thousands of heterogeneous devices
which often operate in swarms-large, dynamic, and self-organizing networks. Remote …

New frontiers in IoT: Networking, systems, reliability, and security challenges

S Bagchi, TF Abdelzaher, R Govindan… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
The field of IoT has blossomed and is positively influencing many application domains. In
this article, we bring out the unique challenges this field poses to research in computer …

{SCRAPS}: Scalable collective remote attestation for {Pub-Sub}{IoT} networks with untrusted proxy verifier

L Petzi, AEB Yahya, A Dmitrienko, G Tsudik… - 31st USENIX Security …, 2022 - usenix.org
Remote Attestation (RA) is a basic security mechanism that detects malicious presence on
various types of computing components, eg, IoT devices. In a typical IoT setting, RA involves …