RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Runtime integrity framework based on trusted computing

I present in this dissertation, a technique to measure the integrity of an operating system, so that the user can verify that all critical software components, including the operating system kernel, is running in a known valid state. The technique solves a key problem of providing continuous runtime verification of kernel memory-space. The measurement is integrated with a trustworthy verificati...

متن کامل

ROTE: Rollback Protection for Trusted Execution

Security architectures such as Intel SGX need protection against rollback attacks, where the adversary violates the integrity of a protected application state by replaying old persistently stored data or by starting multiple application instances. Successful rollback attacks have serious consequences on applications such as financial services. In this paper, we propose a new approach for rollba...

متن کامل

ECDSA on Things: IoT Integrity Protection in Practise

This paper documents some experiences and lessons learned during the development of an IoT security application for the EU-funded project RERUM. The application provides sensor data with end-to-end integrity protection through elliptic curve digital signatures (ECDSA). Here, our focus is on the cost in terms of hardware, runtime and powerconsumption in a real-world trials scenario. We show that...

متن کامل

Enabling Strong Database Integrity using Trusted Execution Environments

Immutable and consistent sharing of data across organization boundaries enables a new class of applications. Because conventional datastores cannot provide this functionality, blockchains have been proposed as one possible solution. Yet public blockchains are energy inefficient, hard to scale and suffer from limited throughput and high latencies, while permissioned blockchains depend on special...

متن کامل

Copyright Protection Protocols for Multimedia Distribution Based on Trusted Hardware

The advent of the Web, electronic commerce and the creation of electronic distribution channels for multimedia content have brought new challenges regarding the protection of intellectual property. As it has become increasingly difficult to protect the distribution medium against copying, techniques for asserting the copyright on information have gained in importance. A particularly promising m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2020

ISSN: 1939-0114,1939-0122

DOI: 10.1155/2020/8957641