Difference between revisions of "Abera2016"
From ACES
(Import from BibTeX) |
|||
| Line 1: | Line 1: | ||
{{publication | {{publication | ||
|entry=inproceedings | |||
|author=Tigist Abera and N. Asokan and Lucas Davi and Farinaz Koushanfar and Andrew Paverd and Ahmad-Reza Sadeghi and Gene Tsudik | |author=Tigist Abera and N. Asokan and Lucas Davi and Farinaz Koushanfar and Andrew Paverd and Ahmad-Reza Sadeghi and Gene Tsudik | ||
|booktitle=Design Automation Conference (DAC) | |||
|title=Things, Trouble, Trust: On Building Trust in IoT Systems | |||
|keywords=Internet of Thing, Remote Attestation, Trust Establishment | |keywords=Internet of Thing, Remote Attestation, Trust Establishment | ||
|abstract=<p>The emerging and much-touted Internet of Things (IoT) presents a variety of security and privacy challenges. Prominent among them is the establishment of trust in remote IoT devices, which is typically attained via remote attestation, a distinct security service that aims to ascertain the current state of a potentially compromised remote device. Remote attestation ranges from relatively heavy-weight secure hardware-based techniques, to light-weight software-based ones, and also includes approaches that blend software (e.g., control-flow integrity) and hardware features (e.g., PUFs). In this paper, we survey the landscape of state-of-the-art attestation techniques from the IoT device perspective and argue that most of them have a role to play in IoT trust establishment.</p> | |abstract=<p>The emerging and much-touted Internet of Things (IoT) presents a variety of security and privacy challenges. Prominent among them is the establishment of trust in remote IoT devices, which is typically attained via remote attestation, a distinct security service that aims to ascertain the current state of a potentially compromised remote device. Remote attestation ranges from relatively heavy-weight secure hardware-based techniques, to light-weight software-based ones, and also includes approaches that blend software (e.g., control-flow integrity) and hardware features (e.g., PUFs). In this paper, we survey the landscape of state-of-the-art attestation techniques from the IoT device perspective and argue that most of them have a role to play in IoT trust establishment.</p> | ||
}} | }} | ||
Revision as of 02:44, 4 September 2021
| Abera2016 | |
|---|---|
| entry | inproceedings |
| address | |
| annote | |
| author | Tigist Abera and N. Asokan and Lucas Davi and Farinaz Koushanfar and Andrew Paverd and Ahmad-Reza Sadeghi and Gene Tsudik |
| booktitle | Design Automation Conference (DAC) |
| chapter | |
| edition | |
| editor | |
| howpublished | |
| institution | |
| journal | |
| month | |
| note | |
| number | |
| organization | |
| pages | |
| publisher | |
| school | |
| series | |
| title | Things, Trouble, Trust: On Building Trust in IoT Systems |
| type | |
| volume | |
| year | |
| doi | |
| issn | |
| isbn | |
| url | |