Security of IoT systems: Design challenges and opportunities

T Xu, JB Wendt, M Potkonjak - 2014 IEEE/ACM International …, 2014 - ieeexplore.ieee.org
Computer-aided design (CAD), in its quest to facilitate new design revolutions, is again on
the brink of changing its scope. Following both historical and recent technological and …

Towards privacy preserving iot environments: a survey

M Seliem, K Elgazzar, K Khalil - Wireless Communications and …, 2018 - Wiley Online Library
The Internet of Things (IoT) is a network of Internet‐enabled devices that can sense,
communicate, and react to changes in their environment. Billions of these computing …

Sok: Secure data deletion

J Reardon, D Basin, S Capkun - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
Secure data deletion is the task of deleting data irrecoverably from a physical medium. In the
digital world, data is not securely deleted by default; instead, many approaches add secure …

Evanesco: Architectural support for efficient data sanitization in modern flash-based storage systems

M Kim, J Park, G Cho, Y Kim, L Orosa, O Mutlu… - Proceedings of the …, 2020 - dl.acm.org
As data privacy and security rapidly become key requirements, securely erasing data from a
storage system becomes as important as reliably storing data in the system. Unfortunately, in …

Scrubbing-aware secure deletion for 3-D NAND flash

WC Wang, CC Ho, YH Chang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Due to the increasing security concerns, the conventional deletion operations in NAND flash
memory can no longer afford the requirement of secure deletion. Although existing works …

Remote wiping and secure deletion on mobile devices: A review

MD Leom, KKR Choo, R Hunt - Journal of forensic sciences, 2016 - Wiley Online Library
Mobile devices have become ubiquitous in almost every sector of both private and
commercial endeavors. As a result of such widespread use in everyday life, many users …

Assured deletion in the cloud: requirements, challenges and future directions

KM Ramokapane, A Rashid, JM Such - Proceedings of the 2016 ACM on …, 2016 - dl.acm.org
Inadvertent exposure of sensitive data is a major concern for potential cloud customers.
Much focus has been on other data leakage vectors, such as side channel attacks, while …

On secure data deletion

J Reardon, D Basin, S Capkun - IEEE security & privacy, 2014 - ieeexplore.ieee.org
During New York City's 2012 Thanksgiving Day parade, sensitive personal data rained from
the sky. Makeshift confetti, formed out of shredded police case reports and personnel fi les …

Polling sanitization to balance I/O latency and data security of high-density SSDs

J Wu, Z Cai, F Yang, J Li, F Trahay, Z Yang… - ACM Transactions on …, 2024 - dl.acm.org
Sanitization is an effective approach for ensuring data security through scrubbing invalid but
sensitive data pages, with the cost of impacts on storage performance due to moving out …

Data recovery from {“Scrubbed”}{NAND} flash storage: Need for analog sanitization

MM Hasan, B Ray - 29th USENIX Security Symposium (USENIX Security …, 2020 - usenix.org
Digital sanitization of flash based non-volatile memory system is a well-researched topic.
Since flash memory cell holds information in the analog threshold voltage, flash cell may …