Privacy-enhancing technologies in biomedical data science

H Cho, D Froelicher, N Dokmai, A Nandi… - Annual review of …, 2024 - annualreviews.org
The rapidly growing scale and variety of biomedical data repositories raise important privacy
concerns. Conventional frameworks for collecting and sharing human subject data offer …

A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects

B Kuang, A Fu, W Susilo, S Yu, Y Gao - Computers & Security, 2022 - Elsevier
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially
considering the fact that 5G technology facilitates numerous services building on IoT …

[HTML][HTML] Enhancing Security in the ISO 15118-20 EV Charging System

R Porter, M Biglari-Abhari, B Tan… - Green Energy and …, 2025 - Elsevier
Abstract Electric Vehicle (EV)'DC Fast Charging'systems directly connect an EV's battery to
an external charger. A compromised EV charger may damage the EV or be used as part of a …

Smaug: A TEE-assisted secured SQLite for embedded systems

D Lu, M Shi, X Ma, X Liu, R Guo… - … on Dependable and …, 2022 - ieeexplore.ieee.org
As one of the most popular relational databases for embedded devices, SQLite is lightweight
to be embedded into applications without installing a specific database management …

Securing the Future Railway System: Technology Forecast, Security Measures, and Research Demands

S Unger, M Heinrich, D Scheuermann, S Katzenbeisser… - Vehicles, 2023 - mdpi.com
The railway industry—traditionally a conservative industry with low adaption speed for
innovation—is currently entering its digitization phase. The sector faces a challenge in …

Mitigating debugger-based attacks to Java applications with self-debugging

D Pizzolotto, S Berlato, M Ceccato - ACM Transactions on Software …, 2024 - dl.acm.org
Java bytecode is a quite high-level language and, as such, it is fairly easy to analyze and
decompile with malicious intents, eg, to tamper with code and skip license checks. Code …

Firmware Integrity Protection: A Survey

A Marchand, Y Imine, H Ouarnoughi, T Tarridec… - IEEE …, 2023 - ieeexplore.ieee.org
Over the last years, firmware integrity protection has significantly been addressed in various
contexts such as internet of things, vehicles, wireless sensor networks and other systems …

Enhancing the Availability and Security of Attestation Scheme for Multiparty-involved DLaaS: A Circular Approach

M Yang, G Huang, H Chen, Y Liao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In this paper, we propose a remote attestation approach based on multiple verifiers named
CARE. CARE aims to enhance the practicality and efficiency of remote attestation while …

Delegating verification for remote attestation using tee

T Yagawa, T Teruya, K Suzaki… - 2024 IEEE European …, 2024 - ieeexplore.ieee.org
Remote Attestation (RA) can check the status of target IoT devices and cloud platforms from
remote locations. In RA, a user is presented with evidence by the target to evaluate its status …

PReFeR: P hysically Re lated F unction bas ed R emote Attestation Protocol

A Mondal, S Gangopadhyay, D Chatterjee… - ACM Transactions on …, 2023 - dl.acm.org
Remote attestation is a request-response based security service that permits a trusted entity
(verifier) to check the current state of an untrusted remote device (prover). The verifier …