Secure and Trusted Application Execution on Embedded Devices

@inproceedings{Markantonakis2015SecureAT,
  title={Secure and Trusted Application Execution on Embedded Devices},
  author={Konstantinos Markantonakis and Raja Naeem Akram and Mehari Msgna},
  booktitle={SECITC},
  year={2015}
}
Embedded devices have permeated into our daily lives and significant day-to-day mundane tasks involve a number of embedded systems. These include smart cards, sensors in vehicles and industrial automation systems. Satisfying the requirements for trusted, reliable and secure embedded devices is more vital than ever before. This urgency is also strengthened further by the potential advent of the Internet of Things and Cyber-Physical Systems. As our reliance on these devices is increasing, the… 
Platform verification and secure program execution in embedded devices
TLDR
This thesis proposes side channel based pre-deployment platform verification techniques that can be used in low-end to medium-end embedded systems and proposes the design of a generic runtime secure program execution architecture.
Systematic Literature Review on the Use of Trusted Execution Environments to Protect Cloud/Fog-Based Internet of Things Applications
TLDR
This study gives a general overview of the use of TEEs for cloud/fog-based IoT applications, bringing some challenges and directions.
An enhanced security framework for home appliances in smart home
TLDR
An enhanced security framework for smart devices in a smart home environment is proposed that provides the integrity system using the self-signing and access control techniques for preventing the security threats such as data modification, leakage and code fabrication.
Evaluation of Cryptography Usage in Android Applications
TLDR
It is shown that 87.8% of the applications present some kind of misuse, while for the rest of them no cryptography usage was detected during the analysis, which suggests countermeasures, mainly intended for developers, to alleviate the issues identified by the analysis.
Designing Efficient Smart Home Management with IoT Smart Lighting: A Case Study
Modeling Evolutionary Algorithms Simulation and Artificial Intelligence, Faculty of Electrical & Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City 700000, Vietnam Faculty of

References

SHOWING 1-10 OF 50 REFERENCES
EDA for secure and dependable cybercars: Challenges and opportunities
TLDR
The arrival of cybercars calls for novel abstractions, models, protocols, design methodologies, testing and evaluation tools to automate the integration and analysis of the safety and security requirements.
Verifying Software Integrity in Embedded Systems: A Side Channel Approach
TLDR
It is shown that side channel leakage (power consumption) can be used to verify the integrity of the software component without prior knowledge of theSoftware code.
A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model
TLDR
This paper explores the reasons behind proposed secure channel protocols failure to meet the UCOM requirements and then proposes a secure and trusted channel protocol that meets them and is suitable to GlobalPlatform's consumer-centric smart cards.
The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems
TLDR
This paper proposes a novel method that verifies a program’s behaviour, such as the control flow, by using the device�'s side channel leakage.
Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators
TLDR
This paper proposes an attestation protocol that provides an on-demand security validation of a smart card by its respective manufacturer and explains the rationale behind the changes to the traditional smart card architecture to accommodate the remote security assurance and validation mechanism.
Establishing the Genuinity of Remote Computer Systems
TLDR
A means by which a remote computer system can be challenged to demonstrate that it is genuine and trustworthy and can be granted access to distributed resources and serve as a general-purpose host for distributed computation so long as it remains in contact with some certifying authority.
Application-Binding Protocol in the User Centric Smart Card Ownership Model
TLDR
A security framework that provides runtime authentication, and verification of an application, and a protocol that is verified using CasperFDR is proposed and implemented and a performance comparison with existing protocols is provided.
Recovering from a Lost Digital Wallet
  • Raja Naeem Akram, K. Markantonakis, K. Mayes
  • Computer Science
    2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing
  • 2013
TLDR
The proposed framework in this paper enables a user to acquire a new smart card as she desires and then migrate/restore all of her applications onto it - facilitating her to recover from her lost digital wallet in a secure, efficient, seamless and ubiquitous manner.
Implementing Embedded Security on Dual-Virtual-CPU Systems
TLDR
A low-cost, dual-virtual-CPU hardware technology for embedded-systems security that integrates a rich operating system without requiring significant changes to it, while maintaining preemptive and real-time properties, exception handling, and power management.
Trojan Detection using IC Fingerprinting
TLDR
These results show that Trojans that are 3-4 orders of magnitude smaller than the main circuit can be detected by signal processing techniques and provide a starting point to address this important problem.
...
...