S Gupta - Journal of Industrial Information Integration, 2023 - Elsevier
Secure and efficient communication to establish a seamless nexus between the five levels of a typical automation pyramid is paramount to Industry 4.0. Specifically, vertical and …
FIDO2 is a suite of protocols that combines the usability of local authentication (eg, biometrics) with the security of public-key cryptography to deliver passwordless …
Virtualization is a key technology used in a wide range of applications, from cloud computing to embedded systems. Over the last few years, mainstream computer architectures were …
H Wang, J Wang, C Ge, Y Li, L Zhou… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The demand for mobile terminals to participate in data services is increasingly vital. The General Data Protection Regulation (GDPR) has established several principled …
Once an attacker compromises the operating system, the integrity and availability of unprotected system audit logs still kept on the computer becomes uncertain. In this paper …
C Wang, Y Deng, Z Ning, K Leach, J Li… - … on Dependable and …, 2023 - ieeexplore.ieee.org
A wide range of Arm endpoints leverage integrated and discrete GPUs to accelerate computation. However, Arm GPU security has not been explored by the community. Existing …
Protecting system observability records (logs) from compromised OSs has gained significant traction in recent times, with several note-worthy approaches proposed. Unfortunately, none …
YH Song, B Woo, Y Han, BBH Kang - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
The existing approaches to instruction trace-based security monitoring hardware are dependent on the privileged software, which presents a significant challenge in defending …
The Android ecosystem relies on either TrustZone (eg, OP-TEE, QTEE, Trusty) or trusted hypervisors (pKVM, Gunyah) to isolate security-sensitive services from malicious apps and …