[HTML][HTML] Evaluating the applicability of hardware trust anchors for automotive applications

C Plappert, D Lorych, M Eckel, L Jäger, A Fuchs… - Computers & …, 2023 - Elsevier
The automotive trend towards autonomous driving and advanced connected services
increases both complexity of the vehicle internal network and the connections to its …

The sa4p framework: Sensing and actuation as a privilege

P De Vaere, F Stöger, A Perrig, G Tsudik - Proceedings of the 19th ACM …, 2024 - dl.acm.org
Popular consumer Internet of Things (IoT) devices provide increasingly diverse sensing and
actuation capabilities. Despite their benefits, such devices prompt numerous security …

OPEC: operation-based security isolation for bare-metal embedded systems

X Zhou, J Li, W Zhang, Y Zhou, W Shen… - Proceedings of the …, 2022 - dl.acm.org
Bare-metal embedded systems usually lack security isolation. Attackers can subvert the
whole system with a single vulnerability. Previous research intends to enforce both privilege …

Verify&revive: Secure detection and recovery of compromised low-end embedded devices

M Ammar, B Crispo - Proceedings of the 36th Annual Computer Security …, 2020 - dl.acm.org
Tiny and specialized computing platforms, so-called embedded or Internet of Things (IoT)
devices, are increasingly used in safety-and privacy-critical application scenarios. A …

Traces: Tee-based runtime auditing for commodity embedded systems

A Caulfield, AJ Neto, N Rattanavipanon… - arXiv preprint arXiv …, 2024 - arxiv.org
Control Flow Attestation (CFA) offers a means to detect control flow hijacking attacks on
remote devices, enabling verification of their runtime trustworthiness. CFA generates a trace …

TeeFilter: High-Assurance Network Filtering Engine for High-End IoT and Edge Devices based on TEEs

J Röckl, N Bernsdorf, T Müller - Proceedings of the 19th ACM Asia …, 2024 - dl.acm.org
Large botnets like Mirai, with 600,000 infected devices, prove that cyber criminals have
recognized the potential of attacks against the fast-growing Internet of Things. Moreover …

Trusted monitor: Tee-based system monitoring

B Jung, C Eichler, J Röckl, R Schlenk… - 2022 XII Brazilian …, 2022 - ieeexplore.ieee.org
As trusted computing becomes increasingly important, Trusted Execution Environments
(TEEs) see more widespread use. A particular high demand for security arises in the context …

{GAROTA}: generalized active {Root-Of-Trust} architecture (for tiny embedded devices)

E Aliaj, IDO Nunes, G Tsudik - 31st USENIX Security Symposium …, 2022 - usenix.org
Embedded (aka smart or IoT) devices are increasingly popular and becoming ubiquitous.
Unsurprisingly, they are also attractive attack targets for exploits and malware. Low-end …

{ACFA}: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation

A Caulfield, N Rattanavipanon, IDO Nunes - 32nd USENIX Security …, 2023 - usenix.org
Embedded devices are increasingly used in a wide range of “smart” applications and
spaces. At the lower-end of the scale, they are implemented under strict cost and energy …

Cyber resilience for the Internet of Things: Implementations with resilience engines and attack classifications

E Alvarenga, JR Brands, P Doliwa… - … on Emerging Topics …, 2022 - ieeexplore.ieee.org
Recently, the number of publicized attacks on IoT devices has noticeably grown. This is in
part due to the increasing deployment of embedded systems into various domains, including …