Filters








12 Hits in 8.3 sec

Remote Attestation: A Literature Review [article]

Alexander Sprogø Banks, Marek Kisiel, Philip Korsholm
2021 arXiv   pre-print
However, extensions to remote attestation also exist, such as code updates, device resets, erasure and attestation of the device's run-time state.  ...  We will describe and evaluate the state-of-the-art for remote attestation, which covers singular attestation of devices as well as newer research in the area of formally verified RA protocols, swarm attestation  ...  The VRASED+PURE RA architecture has been implemented on low-end, commercially available embedded system such as MSP430.  ... 
arXiv:2105.02466v2 fatcat:wpzlezruovat5c35b465xkzb44

GAROTA: Generalized Active Root-Of-Trust Architecture [article]

Esmerald Aliaj, Ivan De Oliveira Nunes, Gene Tsudik
2021 arXiv   pre-print
In this paper, we set out to systematically design a minimal active RoT for tiny low-end MCU-s.  ...  We begin with the following questions: (1) What functions and hardware support are required to guarantee actions in the presence of malware?, (2) How to implement this efficiently?  ...  Conclusions This paper motivated and illustrated the design of GAROTA: an active RoT targeting low-end MCU-s used as platforms for embedded/IoT/CPS devices that perform safety-critical sens-ing and actuation  ... 
arXiv:2102.07014v2 fatcat:helml3iha5hormoq5eo3ubqdoq

Bootstrapping Trust in Commodity Computers

Bryan Parno, Jonathan M. McCune, Adrian Perrig
2010 2010 IEEE Symposium on Security and Privacy  
Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer.  ...  is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data).  ...  Acknowledgements The authors are grateful to Virgil Gligor for stimulating discussions, and to Reiner Sailer, Ron Perez, and the anonymous reviewers for their insightful comments.  ... 
doi:10.1109/sp.2010.32 dblp:conf/sp/ParnoMP10 fatcat:knwcyutj2ndhba7wdrazkn4nbu

Peripheral state persistence for transiently-powered systems

Gautier Berthou, Tristan Delizy, Kevin Marquet, Tanguy Risset, Guillaume Salagnac
2017 2017 Global Internet of Things Summit (GIoTS)  
Contribution This chapter presents Noradio, a proof-of-concept prototype for a TPC-augmented embedded system, as well as an evaluation of Noradio's energy consumption.  ...  is not typically used in embedded software.  ... 
doi:10.1109/giots.2017.8016243 dblp:conf/giots/BerthouDMRS17 fatcat:r2vbvtjlnvdlxkkt6ldrw43l6m

Building a high-performance, programmable secure coprocessor

Sean W Smith, Steve Weingart
1999 Computer Networks  
However, for these coprocessors to be effective, participants in such applications must be able to verify that they are interacting with an authentic program on an authentic, untampered device.  ...  and maintenance must occur in a hostile environment, while minimizing disruption of operations; the device must be able to recover from the vulnerabilities that inevitably emerge in complex software;  ...  Acknowledgments The authors gratefully acknowledge the contributions of entire We also wish to thank Ran Canetti, Michel Hack, and Mike Matyas for their helpful advice, and Bill Arnold, Liam Comerford,  ... 
doi:10.1016/s1389-1286(98)00019-x fatcat:yyy4gxepu5dmjiazl3wgjmnwaq

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses [article]

Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Daniel Reijsbergen, Richard Schumi, Pawel Szalachowski
2020 arXiv   pre-print
Blockchains are distributed systems, in which security is a critical factor for their success.  ...  To fill this gap, the main focus of our work is to systematize and extend the knowledge about the security and privacy aspects of blockchains and contribute to the standardization of this domain.  ...  To mitigate this attack, oracles for obtaining verified data about identities of entities can be employed, possibly as part of the identity management system.  ... 
arXiv:1910.09775v2 fatcat:xvxnekjhtbbt7dc4b3kxy3m6xi

Secure System Virtualization: End-to-End Verification of Memory Isolation [article]

Hamed Nemati
2020 arXiv   pre-print
The reduced trusted computing base minimizes the system attack surface and facilitates the use of formal methods to ensure functional correctness and security of the kernel.  ...  They reduce the software portion of the system's trusted computing base to a thin layer, which enforces isolation between low- and high-criticality components.  ...  Our ongoing work include the development of a end-to-end secure infrastructure, where an administrator can remotely update the software of an embedded device.  ... 
arXiv:2005.02605v1 fatcat:h7sdyjoxyrexhaswjns5mcfdey

Conclusion: What Next for Privacy Seals? [chapter]

Rowena Rodrigues
2018 Privacy and Data Protection Seals  
a visible and defined proof of their commitment to privacy and data protection.  ...  If the relationship with financial service provider is terminated, then the use of Verified by Visa through that service provider would also end.  ...  of the right to request access to and rectification or erasure  Right to lodge a complaint to the supervisory authority  Recipients, categories of recipients of personal data  Transfer to a third country  ... 
doi:10.1007/978-94-6265-228-6_9 fatcat:mpex6asr7bcwnmu7bazvkyblje

Enclave Computing Paradigm: Hardware-assisted Security Architectures & Applications

Franz Ferdinand Peter Brasser
2020
It enables novel use cases by providing many parallel mutually isolated TEE-instances without the need to rely on complex privileged entities.  ...  In classical system architectures, an application's security depends on the security of all privileged system entities, for example the Operating System.  ...  PURE extends VRASED with three provably secure services that leverage RA, providing provably secure software update, memory-erasure, and system-wide resets [309] . RA-related Works.  ... 
doi:10.25534/tuprints-00011912 fatcat:2xf7ax7tcvbhrn76cdvcesfj6e

Future trends in microelectronics - reflections on the road to nanotechnology

1997 Precision engineering  
information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188), Washington,  ...  the data needed, and completing and reviewing the collection of information.  ...  We consider such grating structures particularly promising for future applications, and extensive studies of such structures are currently underway, to be reported in due course.  ... 
doi:10.1016/0141-6359(97)90048-9 fatcat:j7blw4wn6zbitmoqqffj46g54e

When Designers Ask, "What If?"

E. Scott Denison
2012 World Future Review  
form of design research, in a construct with different rules and possibilities, to experiment with the impact of technology and design on society, government, culture, and individuals.  ...  These scenarios can bring cultural legibility to representations of the future and thereby provoke discussion and debate, challenge conventional thinking, and encourage individual foresight and participation  ...  Ironically, they occupy the same real estate and have come to replace natural human fingerprint. 5.6.3.3 A Lightpod Diegetic prototypes become physical attestations of larger systems and serve to convey  ... 
doi:10.1177/194675671200400207 fatcat:q2cflwvbwrb63cov24mnjadjne

The First Workshop on Information Hiding Techniques for Internet Anonymity and Privacy

Massimo Villari
INTERNET 2012 The Fourth International Conference on Evolving Internet IHTIAP 2012   unpublished
Acknowledgments This work was supported partially by the EC in the context of the ALICANTE project (FP7-ICT-248652) and partially by the projects POSDRU/89/1.5/S/62557 together with POSDRU/88/1.5/S/61178  ...  increasing the confidence of watermark detection, will also be embedded.  ...  , grouping information, etc.) influence the behavior of a component and may need to be updated remotely.  ... 
fatcat:qde6lpe4engxxbzy7jry4w6iw4