Dynamic Swarm Attestation With Malicious Devices Identification
نویسندگان
چکیده
منابع مشابه
Dynamic Policy Discovery with Remote Attestation
Remote attestation allows programs running on trusted hardware to prove their identity (and that of their environment) to programs on other hosts. Remote attestation can be used to address security concerns if programs agree on the meaning of data in attestations. This paper studies the enforcement of codeidentity based access control policies in a hostile distributed environment, using a combi...
متن کاملBuilding Dynamic Remote Attestation Framework
Method Step 1: The attestee measures the information including TSL, codes and data and policy and send to the attester Step 2:The attestee generates the policy and TSL updates information and sends to attester Step 3: The attester verifies the measured information of the attestee Step 4: The attester verifies the reporting processes of the attester which is for the attestee information measurem...
متن کاملMalicious Software in Mobile Devices
This chapter examines the scope of malicious software (malware) threats to mobile devices. The stakes for the wireless industry are high. While malware is rampant among 1 billion PCs, approximately twice as many mobile users currently enjoy a malware-free experience. However, since the appearance of the Cabir worm in 2004, malware for mobile devices has evolved relatively quickly, targeted most...
متن کاملModelling Dynamic Trust with Property Based Attestation in Trusted Platforms
Binary attestation in trusted computing provides the ability to reason about the state of a platform using integrity measurements. Property based attestation, an extension of binary attestation enables more meaningful attestation by abstracting low level binary values to high level security properties or functions of platforms. We believe that despite having trusted processes for integrity meas...
متن کاملProbabilistic and Considerate Attestation of IoT Devices against Roving Malware
Remote Attestation (RA) is a popular means of detecting malware presence (or verifying its absence) on embedded and IoT devices. It is especially relevant to low-end devices that are incapable of protecting themselves against infection. Malware that is aware of ongoing or impending attestation and aims to avoid detection can relocate itself during computation of the attestation measurement. In ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2018
ISSN: 2169-3536
DOI: 10.1109/access.2018.2869307