[go: up one dir, main page]

Al-Galby et al., 2018 - Google Patents

Hardware Root of Trust for Linux Based Edge Gateway

Al-Galby et al., 2018

View PDF
Document ID
14112591127651513475
Author
Al-Galby M
Arezou M
Publication year

External Links

Snippet

Abstract Linux-based Edge Gateways that connects hundreds or maybe thousands of IoT devices, are exposed to various threats and cyber-attacks from the internet. These attacks form a considerable risk targeting the privacy and confidentiality of IoT devices throughout …
Continue reading at www.diva-portal.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Similar Documents

Publication Publication Date Title
RU2759331C2 (en) Unsealing data with sealing enclave
McCune et al. Flicker: An execution infrastructure for TCB minimization
Parno et al. Bootstrapping trust in modern computers
US8074262B2 (en) Method and apparatus for migrating virtual trusted platform modules
JP4732513B2 (en) Method and apparatus for providing a software-based security coprocessor
US7571312B2 (en) Methods and apparatus for generating endorsement credentials for software-based security coprocessors
Marchesini et al. Experimenting with TCPA/TCG hardware, or: How I learned to stop worrying and love the bear
Sparks A security assessment of trusted platform modules
US20150261978A1 (en) Method and apparatus for remotely provisioning software-based security coprocessors
Chen et al. {MAGE}: Mutual attestation for a group of enclaves without trusted third parties
CN115048652A (en) End-to-end security for hardware running verified software
Aslam et al. Security and trust preserving inter‐and intra‐cloud VM migrations
Parno Trust extension as a mechanism for secure code execution on commodity computers
Nepal et al. A mobile and portable trusted computing platform
Antonino et al. Flexible remote attestation of pre-SNP SEV VMs using SGX enclaves
Fotiadis et al. Root-of-Trust abstractions for symbolic analysis: Application to attestation protocols
Sisinni Verification of software integrity in distributed systems
Bugiel et al. Implementing an application-specific credential platform using late-launched mobile trusted module
Al-Galby et al. Hardware Root of Trust for Linux Based Edge Gateway
Toegl et al. Specification and standardization of a java trusted computing api
Donnini Integration of the DICE specification into the Keystone framework
Raval et al. Hardware Root of Trust on IoT Gateway
Martin Designing Secure IoT Devices with the Arm Platform Security Architecture and Cortex-M33
D'Onghia Use of SGX to protect network nodes
Quaresma TrustZone based attestation in secure runtime verification for embedded systems