Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2018
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks
ASIACCS '18: Proceedings of the 2018 on Asia Conference on Computer and Communications SecurityPages 329–342https://doi.org/10.1145/3196494.3196544Today, tiny embedded Internet of Things (IoT) devices are increasingly used in safety- and privacy-critical application scenarios. In many of these scenarios, devices perform a certain task collectively as a swarm. Remote attestation is an important ...
- research-articleOctober 2016
SANA: Secure and Scalable Aggregate Network Attestation
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 731–742https://doi.org/10.1145/2976749.2978335Large numbers of smart connected devices, also named as the Internet of Things (IoT), are permeating our environments (homes, factories, cars, and also our body - with wearable devices) to collect data and act on the insight derived. Ensuring software ...
- posterJuly 2016
POSTER: Toward a Secure and Scalable Attestation
WiSec '16: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile NetworksPages 229–230https://doi.org/10.1145/2939918.2942425Large numbers of smart devices are permeating our environment to collect data and act on the insight derived. Examples of such devices include smart homes, factories, cars, or wearables. For privacy, security, and safety, ensuring correctness of the ...
- research-articleJuly 2016
DARPA: Device Attestation Resilient to Physical Attacks
WiSec '16: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile NetworksPages 171–182https://doi.org/10.1145/2939918.2939938As embedded devices (under the guise of "smart-whatever") rapidly proliferate into many domains, they become attractive targets for malware. Protecting them from software and physical attacks becomes both important and challenging. Remote attestation is ...