Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions

G Karagiannis, O Altintas, E Ekici… - … surveys & tutorials, 2011 - ieeexplore.ieee.org
Vehicular networking has significant potential to enable diverse applications associated with
traffic safety, traffic efficiency and infotainment. In this survey and tutorial paper we introduce …

SANA: Secure and scalable aggregate network attestation

M Ambrosin, M Conti, A Ibrahim, G Neven… - Proceedings of the …, 2016 - dl.acm.org
Large numbers of smart connected devices, also named as the Internet of Things (IoT), are
permeating our environments (homes, factories, cars, and also our body-with wearable …

Principles of remote attestation

G Coker, J Guttman, P Loscocco, A Herzog… - International Journal of …, 2011 - Springer
Remote attestation is the activity of making a claim about properties of a target by supplying
evidence to an appraiser over a network. We identify five central principles to guide …

A security framework for the analysis and design of software attestation

F Armknecht, AR Sadeghi, S Schulz… - Proceedings of the 2013 …, 2013 - dl.acm.org
Software attestation has become a popular and challenging research topic at many
established security conferences with an expected strong impact in practice. It aims at …

New results for timing-based attestation

X Kovah, C Kallenberg, C Weathers… - … IEEE Symposium on …, 2012 - ieeexplore.ieee.org
In this paper we present a comprehensive timing-based attestation system suitable for
typical enterprise use, and evidence of that system's performance. This system, similar to …

PUFatt: Embedded platform attestation based on novel processor-based PUFs

J Kong, F Koushanfar, PK Pendyala… - Proceedings of the 51st …, 2014 - dl.acm.org
Software-based attestation schemes aim at proving the integrity of code and data residing
on a platform to a verifying party. However, they do not bind the hardware characteristics to …

Lightweight swarm attestation: A tale of two lisa-s

X Carpent, K ElDefrawy, N Rattanavipanon… - … of the 2017 ACM on Asia …, 2017 - dl.acm.org
In the last decade, Remote Attestation (RA) emerged as a distinct security service for
detecting attacks on embedded devices, cyber-physical systems (CPS) and Internet of …

SeED: secure non-interactive attestation for embedded devices

A Ibrahim, AR Sadeghi, S Zeitouni - … of the 10th ACM conference on …, 2017 - dl.acm.org
Remote attestation is a security service that is typically realized by an interactive challenge-
response protocol that allows a trusted verifier to capture the state of a potentially untrusted …

[PDF][PDF] White-Box Cryptography.

B Wyseur - 2011 - whiteboxcrypto.com
White-Box Cryptography Cryptography: the basic principle Keys in cryptography
Cryptography is part of our modern life Example: i Page 1 5/03/2009 1 White-Box …

ERASMUS: Efficient remote attestation via self-measurement for unattended settings

X Carpent, G Tsudik… - 2018 Design, Automation …, 2018 - ieeexplore.ieee.org
Remote attestation (RA) is a popular means of detecting malware in embedded and IoT
devices. RA is usually realized as a protocol via which a trusted verifier measures software …