Filters








46,941 Hits in 3.0 sec

Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016)

Xinxin Fan, Tim Güneysu
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
The Workshop on Trustworthy Embedded Devices (TrustED) addresses all aspects of security and privacy related to embedded systems and the IoT.  ...  TrustED 2016 is a continuation of previous workshops in this series, which were held in conjunction with ESORICS 2011, IEEE Security & Privacy 2012, ACM CCS 2013, ACM CCS 2014, and ACM CCS 2015 (see http  ...  (e.g., TrustZone, TPMs) on mobile devices • Remote attestation and integrity validation • Privacy aspects of embedded systems (e.g., medical devices, electronic IDs) • Physical and logical convergence  ... 
doi:10.1145/2976749.2990489 dblp:conf/ccs/FanG16 fatcat:nc26utz5wvebzglshivgoykhmq

SCADA System Cyber Security [chapter]

Igor Nai Fovino
2013 Secure Smart Embedded Devices, Platforms and Applications  
His scientific interests lie in the areas of public-key infrastructures, embedded systems, e-government services, authentication systems, smart cards, electronic payment systems and security  ...  Acknowledgments This book would not have been possible without the help and support of a number of organisations and individuals.  ...  aspects of Secure Embedded Devices.  ... 
doi:10.1007/978-1-4614-7915-4_20 fatcat:xhfree5esffihhwwxrtpm2i25u

Embedded security for Internet of Things

Arijit Ukil, Jaydip Sen, Sripad Koilakonda
2011 2011 2nd National Conference on Emerging Trends and Applications in Computer Science  
In this work, we provide the requirements of embedded security, the solutions to resist different attacks and the technology for defying temper proofing of the embedded devices by the concept of trusted  ...  IoT imposes peculiar constraints in terms of connectivity, computational power and energy budget, which makes it significantly different from those contemplated by the canonical doctrine of security in  ...  The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation.  ... 
doi:10.1109/ncetacs.2011.5751382 fatcat:6jw6woxxwzcvzadxl2h4kltj74

Access Mechanism of Interactive Terminals of Smart Grid

Kehe Wu, Fei Chen, Yi Li
2014 International Journal of Grid and Distributed Computing  
Based on safe requirement and trust computing theory, TCM(Trust Cryptographic Module) and TAS(Trust Access Server) are introduced to Interactive terminals and boundary of information network respectively  ...  Trusted operating environment, trusted identity and credible communication are ensured through the cooperative work of TCM and TAS, which makes terminals be accessed credibly.  ...  For the aspect of hardware, it utilizes the universal architecture based on ARM, and for software, it use embedded operating systems such as WINCE and Windows Mobile and use mobile communication generally  ... 
doi:10.14257/ijgdc.2014.7.2.17 fatcat:ir6z4bqthbd4bfgkbjsaatundq

Trusted computing building blocks for embedded linux-based ARM trustzone platforms

Johannes Winter
2008 Proceedings of the 3rd ACM workshop on Scalable trusted computing - STC '08  
Security is an emerging topic in the field of mobile and embedded platforms.  ...  The Trusted Computing Group (TCG) has outlined one possible approach to mobile platform security by recently extending their set of Trusted Computing specifications with Mobile Trusted Modules (MTMs).  ...  When attempting to implement TCG-compatible Trusted Computing systems on mobile and embedded devices a number of issues not addressed by the PC-oriented TPM specifications arise.  ... 
doi:10.1145/1456455.1456460 dblp:conf/ccs/Winter08 fatcat:x4waayswbzbwrlutiqngtweoyu

A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth

A. Dardanelli, F. Maggi, M. Tanelli, S. Zanero, S. M. Savaresi, R. Kochanek, T. Holz
2013 IEEE Embedded Systems Letters  
Modern vehicles are increasingly being interconnected with computer systems, which collect information both from vehicular sources and Internet services.  ...  In this letter, a hierarchically distributed control system architecture which integrates a smartphone with classical embedded systems is presented, and an ad-hoc, end-to-end security layer is designed  ...  A party is considered a trusted domain if we trust its correct processing and execution of the software implementation, and thus its integrity.  ... 
doi:10.1109/les.2013.2264594 fatcat:cqheypaxqndzbj6pysx65dvgwu

On the Deployment of Mobile Trusted Modules

Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper
2008 2008 IEEE Wireless Communications and Networking Conference  
We propose an approach for the practical design and implementation of this concept and how to deploy it to a trustworthy operating platform.  ...  For this purpose, the TCG devises a trusted mobile platform as a set of trusted engines on behalf of different stakeholders supported by a physical trust-anchor.  ...  for implementing trust in mobile computing platforms by introducing a new, hardware-based trust anchor for mobile phones and devices.  ... 
doi:10.1109/wcnc.2008.553 dblp:conf/wcnc/SchmidtKK08 fatcat:lfzvshumabdufkjzhgvob7f22m

Assessing Software Risks by Implementing Cloud Readiness and Benchmarking in the Pervasive Environments

2019 International Journal of Engineering and Advanced Technology  
This state of art will create a case for developing new models for access control, identity, trust, risk management in ubiquitous or pervasive computing environments.  ...  The paper has implemented the benchmarking of smart applications by a smart tool by gathering various application and business metrices to improve software performance.  ...  • Privacy and Trust: In mobile computing, it's not only difficult to define the trust amongst different devices but also protecting against bad usage of data poses challenges.  ... 
doi:10.35940/ijeat.a1024.1091s19 fatcat:cpfhspnoafhc3lz6qxeg5ba6vq

Trustworthy Hardware [Scanning the Issue]

Ramesh Karri, Farinaz Koushanfar
2014 Proceedings of the IEEE  
S ince the 1990s, there has been a steady trend away from inhouse integrated circuit (IC) design and fabrication toward outsourcing various aspects of design, fabrication, testing, and packaging of ICs  ...  This special issue showcases advances in state-of-the-art trustworthy ICs and systems, and spans several aspects of IC and system security ranging from theoretical and conceptual foundations, synthesis  ...  The next paper in embedded security titled ''Mobile trusted computing'' surveys the trusted computing features in historical computing systems as well as in state-of-the-art mobile computing systems by  ... 
doi:10.1109/jproc.2014.2334837 fatcat:oifb7mphljhrhpdzbqfexw3h6y

On Socio-Technical Enablers for Ubiquitous Computing Applications

Kurt Geihs, J. M. Leimeister, Alexander Roonagel, Ludger Schmidt
2012 Social Science Research Network  
The focus of this paper is on context-aware, selfadaptive ubiquitous computing applications that involve mobile users.  ...  implementation.  ...  ACKNOWLEDGMENT We thank all members of the VENUS project at the University of Kassel for their contributions.  ... 
doi:10.2139/ssrn.2475863 fatcat:hrqaryqj3vavdn4s66sxc4ifxq

Embedded security in a pervasive world

Christof Paar, André Weimerskirch
2007 Information Security Technical Report  
One often overlooked aspect of pervasive computing, however, are new security threats.  ...  The networking of the myriads of embedded devices gives rise to the brave new world of pervasive computing.  ...  Examples include digital rights management and trusted computing platforms for embedded applications such as home networks or car navigation systems.  ... 
doi:10.1016/j.istr.2007.05.006 fatcat:rbcdojsywvhwjdapqrp4k5cdpq

Are there good reasons for protecting mobile phones with hypervisors?

Christian Gehrmann, Heradon Douglas, Dennis Kengo Nilsson
2011 2011 IEEE Consumer Communications and Networking Conference (CCNC)  
In short, hypervisors exhibit several advantages such as support of multiple secure execution domains and monitoring of non-trusted domains; however, this comes at the cost of larger legacy system porting  ...  Key security components of the architecture have been verified through a hypervisor implemented on an emulated ARM platform.  ...  Small Trusted Computing Base (TCB) and evidence for that the TCB is sound.  ... 
doi:10.1109/ccnc.2011.5766638 dblp:conf/ccnc/GehrmannDN11 fatcat:tbc3jnnfcrhkjgnlylezpql6my

Mobile Platform and Secure Access Approach of UMTS Terminal Based on Trusted Computing

Yingyou Wen, Xuena Peng, Shuyi Chen, Hong Zhao
2011 Journal of Networks  
; b) trusted measurement and verification is implemented based on the measurement root and verification root embedded in MTM, and the authentication and integrity of the mobile terminal is assured; c)  ...  TRUSTED COMPUTING AND MOBILE TRUSTED MODULE A.  ... 
doi:10.4304/jnw.6.4.615-622 fatcat:md2occboybhhtn4dn5n6gcnmfm

TZ-MRAS: A Remote Attestation Scheme for the Mobile Terminal Based on ARM TrustZone

Ziwang Wang, Yi Zhuang, Zujia Yan
2020 Security and Communication Networks  
With the widespread use of mobile embedded devices in the Internet of Things, mobile office, and edge computing, security issues are becoming more and more serious.  ...  To ARM's mobile platform, we propose a mobile remote attestation scheme based on ARM TrustZone (TZ-MRAS), which uses the highest security authority of TrustZone to implement trusted attestation service  ...  Profiting from the fact that TrustZone technology has been applied to most mobile embedded devices, TrustZone has become the de facto standard for mobile devices to implement trusted computing, providing  ... 
doi:10.1155/2020/1756130 fatcat:cqxt55hkizgrbdvunpugrx7kae

D3.8 - Uloop Framework Design And Implementation Report

Paulo Mendes
2013 Zenodo  
aspects, conceptual work as well as implementation choices.  ...  This document represents deliverable D3.8 of the EU FP7 IST project ULOOP (User-centric Wireless Local Loop, grant Number 257418). It is a follow-up of deliverables D2.3, D3, and D3.a.  ...  Acknowledgements Acknowledgement to the significant contribution provided by all partners participating in Work Package 3 of the ULOOP Project.  ... 
doi:10.5281/zenodo.33132 fatcat:3rvyh6mqjja43h5keho34u4yzi
« Previous Showing results 1 — 15 out of 46,941 results