Al-Galby et al., 2018 - Google Patents
Hardware Root of Trust for Linux Based Edge GatewayAl-Galby et al., 2018
View PDF- Document ID
- 14112591127651513475
- Author
- Al-Galby M
- Arezou M
- Publication year
External Links
Snippet
Abstract Linux-based Edge Gateways that connects hundreds or maybe thousands of IoT devices, are exposed to various threats and cyber-attacks from the internet. These attacks form a considerable risk targeting the privacy and confidentiality of IoT devices throughout …
- 238000003860 storage 0 abstract description 62
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2759331C2 (en) | Unsealing data with sealing enclave | |
McCune et al. | Flicker: An execution infrastructure for TCB minimization | |
Parno et al. | Bootstrapping trust in modern computers | |
US8074262B2 (en) | Method and apparatus for migrating virtual trusted platform modules | |
JP4732513B2 (en) | Method and apparatus for providing a software-based security coprocessor | |
US7571312B2 (en) | Methods and apparatus for generating endorsement credentials for software-based security coprocessors | |
Marchesini et al. | Experimenting with TCPA/TCG hardware, or: How I learned to stop worrying and love the bear | |
Sparks | A security assessment of trusted platform modules | |
US20150261978A1 (en) | Method and apparatus for remotely provisioning software-based security coprocessors | |
Chen et al. | {MAGE}: Mutual attestation for a group of enclaves without trusted third parties | |
CN115048652A (en) | End-to-end security for hardware running verified software | |
Aslam et al. | Security and trust preserving inter‐and intra‐cloud VM migrations | |
Parno | Trust extension as a mechanism for secure code execution on commodity computers | |
Nepal et al. | A mobile and portable trusted computing platform | |
Antonino et al. | Flexible remote attestation of pre-SNP SEV VMs using SGX enclaves | |
Fotiadis et al. | Root-of-Trust abstractions for symbolic analysis: Application to attestation protocols | |
Sisinni | Verification of software integrity in distributed systems | |
Bugiel et al. | Implementing an application-specific credential platform using late-launched mobile trusted module | |
Al-Galby et al. | Hardware Root of Trust for Linux Based Edge Gateway | |
Toegl et al. | Specification and standardization of a java trusted computing api | |
Donnini | Integration of the DICE specification into the Keystone framework | |
Raval et al. | Hardware Root of Trust on IoT Gateway | |
Martin | Designing Secure IoT Devices with the Arm Platform Security Architecture and Cortex-M33 | |
D'Onghia | Use of SGX to protect network nodes | |
Quaresma | TrustZone based attestation in secure runtime verification for embedded systems |