[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Chen et al., 2017 - Google Patents

Secure and efficient software-based attestation for industrial control devices with arm processors

Chen et al., 2017

Document ID
16835923848310332572
Author
Chen B
Dong X
Bai G
Jauhar S
Cheng Y
Publication year
Publication venue
Proceedings of the 33rd Annual Computer Security Applications Conference

External Links

Snippet

For industrial control systems, ensuring the software integrity of their devices is a key security requirement. A pure software-based attestation solution is highly desirable for protecting legacy field devices that lack hardware root of trust (eg, Trusted Platform Module) …
Continue reading at dl.acm.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories

Similar Documents

Publication Publication Date Title
Chen et al. Secure and efficient software-based attestation for industrial control devices with arm processors
Murdock et al. Plundervolt: Software-based fault injection attacks against Intel SGX
Jang et al. SGX-Bomb: Locking down the processor via Rowhammer attack
EP2467793B1 (en) Auditing a device
Steiner et al. Attestation in wireless sensor networks: A survey
US9177153B1 (en) Verifying integrity and guaranteeing execution of code on untrusted computer platform
US8285999B1 (en) System and method for authenticating remote execution
US8370935B1 (en) Auditing a device
Shepherd et al. Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis
US8949989B2 (en) Auditing a device
Ling et al. Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes
Tan et al. A TPM-enabled remote attestation protocol (TRAP) in wireless sensor networks
Khalifa et al. A lightweight cryptography (LWC) framework to secure memory heap in Internet of Things
Li et al. Establishing software-only root of trust on embedded systems: facts and fiction
Carpent et al. Temporal consistency of integrity-ensuring computations and applications to embedded systems security
Dinu et al. SIA: Secure intermittent architecture for off-the-shelf resource-constrained microcontrollers
Su et al. SecuCode: Intrinsic PUF entangled secure wireless code dissemination for computational RFID devices
Lee et al. Security issues on the CNG cryptography library (Cryptography API: Next Generation)
Jakobsson et al. Retroactive detection of malware with applications to mobile platforms
Neto et al. Isc-flat: On the conflict between control flow attestation and real-time operations
Kumar et al. A comprehensive survey on hardware-assisted malware analysis and primitive techniques
Jeong et al. MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android
Gupta et al. Security and Cryptography
Sajid et al. An analysis on host vulnerability evaluation of modern operating systems
Kennell et al. An analysis of proposed attacks against genuinity tests