Chen et al., 2017 - Google Patents
Secure and efficient software-based attestation for industrial control devices with arm processorsChen et al., 2017
- Document ID
- 16835923848310332572
- Author
- Chen B
- Dong X
- Bai G
- Jauhar S
- Cheng Y
- Publication year
- Publication venue
- Proceedings of the 33rd Annual Computer Security Applications Conference
External Links
Snippet
For industrial control systems, ensuring the software integrity of their devices is a key security requirement. A pure software-based attestation solution is highly desirable for protecting legacy field devices that lack hardware root of trust (eg, Trusted Platform Module) …
- 238000000034 method 0 abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chen et al. | Secure and efficient software-based attestation for industrial control devices with arm processors | |
Murdock et al. | Plundervolt: Software-based fault injection attacks against Intel SGX | |
Jang et al. | SGX-Bomb: Locking down the processor via Rowhammer attack | |
EP2467793B1 (en) | Auditing a device | |
Steiner et al. | Attestation in wireless sensor networks: A survey | |
US9177153B1 (en) | Verifying integrity and guaranteeing execution of code on untrusted computer platform | |
US8285999B1 (en) | System and method for authenticating remote execution | |
US8370935B1 (en) | Auditing a device | |
Shepherd et al. | Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis | |
US8949989B2 (en) | Auditing a device | |
Ling et al. | Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes | |
Tan et al. | A TPM-enabled remote attestation protocol (TRAP) in wireless sensor networks | |
Khalifa et al. | A lightweight cryptography (LWC) framework to secure memory heap in Internet of Things | |
Li et al. | Establishing software-only root of trust on embedded systems: facts and fiction | |
Carpent et al. | Temporal consistency of integrity-ensuring computations and applications to embedded systems security | |
Dinu et al. | SIA: Secure intermittent architecture for off-the-shelf resource-constrained microcontrollers | |
Su et al. | SecuCode: Intrinsic PUF entangled secure wireless code dissemination for computational RFID devices | |
Lee et al. | Security issues on the CNG cryptography library (Cryptography API: Next Generation) | |
Jakobsson et al. | Retroactive detection of malware with applications to mobile platforms | |
Neto et al. | Isc-flat: On the conflict between control flow attestation and real-time operations | |
Kumar et al. | A comprehensive survey on hardware-assisted malware analysis and primitive techniques | |
Jeong et al. | MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android | |
Gupta et al. | Security and Cryptography | |
Sajid et al. | An analysis on host vulnerability evaluation of modern operating systems | |
Kennell et al. | An analysis of proposed attacks against genuinity tests |