Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3427228.3427293acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices

Published: 08 December 2020 Publication History

Abstract

Many IoT devices are geographically distributed without human administrators, which are maintained by a remote server to enforce security updates, ideally through machine-to-machine (M2M) management. However, malware often terminates the remote control mechanism immediately after compromise and hijacks the device completely. The compromised device has no way to recover and becomes part of a botnet. Even if the IoT device remains uncompromised, it is required to update due to recall or other reasons. In addition, the device is desired to be automatically disposable after the expiration of its service, software, or device hardware to prevent being cyber debris.
We present Reboot-Oriented IoT (RO-IoT), which updates the total OS image autonomously to recover from compromise (rootkit or otherwise), and manages the life cycle of the device using Trusted Execution Environment (TEE) and PKI-based certificates (i.e., CA, server, and client certificates which are linked to device, software, and service). RO-IoT is composed of three TEE-protected components: the secure network bootloader, periodic memory forensics, and life cycle management. The secure network bootloader downloads and verifies the OS image by the TEE. The periodic memory forensics causes a hardware system-reset (i.e., reboot) after detecting any un-registered binary or a time-out, which depends on a TEE-protected watchdog timer. The life cycle management checks the expiration of PKI-based certificates for the device, software, and service, and deactivates the device if necessary. These features complement each other, and all binaries and certificates are encrypted or protected by TEE. We implemented a prototype of RO-IoT on an ARM Hikey board with the open source trusted OS OP-TEE. The design and implementation take account of availability (over 99.9%) and scalability (less than 100MB traffic for a full OS update, and estimated at a cent per device), making the current prototype specifically suitable for the AI-Edge (Artificial Intelligence on the Edge) IoT devices.

References

[1]
Iago Abal, Claus Brabrand, and Andrzej Wasowski. 2014. 42 variability bugs in the Linux kernel: a qualitative analysis. In International Conference on Automated Software Engineering (ASE).
[2]
Fardin Abdi, Chien-Ying Chen, Monowar Hasan, Songran Liu, Sibin Mohan, and Marco Caccamo. 2018. Guaranteed Physical Security with Restart-Based Design for Cyber-Physical Systems. In International Conference on Cyber-Physical Systems(ICCPS).
[3]
Fardin Abdi, Monowar Hasan, Sibin Mohan, Disha Agarwal, and Marco Caccamo. 2016. ReSecure: A Restart-Based Security Protocol for Tightly Actuated Hard Real-Time Systems. In IEEE Workshop on Security and Dependability of Critical Embedded Real-Time Systems(CERTS).
[4]
Fardin Abdi, Rohan Tabish, Matthias Rungger, Majid Zamani, and Marco Caccamo. 2017. Application and System-Level Software Fault Tolerance through Full System Restarts. In International Conference on Cyber-Physical Systems (ICCPS).
[5]
Murat Ali, Jozef Hubertus Alfonsus Vlaskamp, Nof Nasser Eddin, Ben Falconer, and Colin Oram. 2013. Technical Development and Socioeconomic Implications of the Raspberry Pi as a Learning Tool in Developing Countries. In Computer Science and Electronic Engineering Conference (CEEC).
[6]
Werner Almesberger. 2006. kboot - A boot loader based on Kexec. In Proceedings of the Linux symposium (OLS).
[7]
Hussain MJ Almohri, Layne T Watson, and David Evans. 2017. Misery Digraphs: delaying intrusion attacks in obscure clouds. IEEE Transactions on Information Forensics and Security 13, 6(2017), 1361–1375.
[8]
Amazon Web Services. 2019. Amazon EC2 Pricing, https://aws.amazon.com/ec2/pricing/on-demand/.
[9]
Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Seaman Chad, Nick Sullivan, Kurt Thomas, and Yi Zhou. 2017. Understanding the Mirai Botnet. In USENIX Security symposium.
[10]
ARE Project. 2018. http://are1.tech/.
[11]
Joe Armstrong. 2003. Making reliable distributed systems in the presence of software errors. Ph.D. Dissertation. Mikroelektronik och informationsteknik.
[12]
Jeff Arnold and M Frans Kaashoek. 2009. Ksplice: Automatic Rebootless Kernel Updates. In European conference on Computer systems, (EuroSys).
[13]
Miguel A Arroyo, M Tarek Ibn Ziad, Hidenori Kobayashi, Junfeng Yang, and Simha Sethumadhavan. 2019. YOLO: Frequently Resetting Cyber-Physical Systems for Security. In Autonomous Systems: Sensors, Processing, and Security for Vehicles and Infrastructure 2019, Vol. 11009.
[14]
Tarek M. Attia. 2019. Challenges and Opportunities in the Future Applications of IoT Technology. https://www.econstor.eu/bitstream/10419/201752/1/ITS2019-Aswan-paper-61.pdf
[15]
Ahmed M Azab, Peng Ning, Jitesh Shah, Quan Chen, Rohan Bhutkar, Guruprasad Ganesh, Jia Ma, and Wenbo Shen. 2014. Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World. In Computer and Communications Security (CCS).
[16]
Ahmed M Azab, Kirk Swidowski, Rohan Bhutkar, Jia Ma, Wenbo Shen, Ruowen Wang, and Peng Ning. 2016. SKEE: A lightweight Secure Kernel-level Execution Environment for ARM. In Network and Distributed System Security Symposium (NDSS).
[17]
Erick Bauman, Gbadebo Ayoade, and Zhiqiang Lin. 2015. A Survey on Hypervisor-Based Monitoring: Approaches, Applications, and Evolutions. ACM Computing Surveys (CSUR) 48, 1 (2015), 1–33.
[18]
BBC News. 2019. Children’s smartwatch recalled over data fears, https://www.bbc.com/news/technology-47130269.
[19]
Elisa Bertino and Nayeem Islam. 2017. Botnets and Internet of Things Security. Computer 50, 2 (2017), 76–79.
[20]
Manish Bhatt, Irfan Ahmed, and Zhiqiang Lin. [n.d.]. Using Virtual Machine Introspection for Operating Systems Security Education. In ACM Technical Symposium on Computer Science Education.
[21]
Dion Blazakis. 2010. Interpreter exploitation: Pointer inference and JIT spraying. In Black Hat DC.
[22]
BoringSSL. 2014. https://boringssl.googlesource.com/boringssl/.
[23]
Benjamin Bucklin Brown. 2018. Over-the-Air (OTA) Updates in Embedded Microcontroller Applications: Design TradeOffs and Lessons Learned. Analog Dialogue Technical Journal 52 (2018), 52–11.
[24]
Seraphin B Calo, Maroun Touna, Dinesh C Verma, and Alan Cullen. 2017. Edge Computing Architecture for applying AI to IoT. In IEEE International Conference on Big Data (Big Data).
[25]
George Candea and Armando Fox. 2003. Crash-Only Software. In Hot Topics in Operating Systems (HotOS).
[26]
George Candea, Shinichi Kawamoto, Yuichi Fujiki, Greg Friedman, and Armando Fox. 2003. Microreboot–A Technique for Cheap Recovery. In USENIX Annual Technical Conference (USENIX ATC).
[27]
Censys. 2016. https://censys.io/.
[28]
David Cerdeira, Nuno Santos, Pedro Fonseca, and Sandro Pinto. 2020. SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems. In IEEE Symposium on Security and Privacy(IEEE S&P).
[29]
Ramesh Chandra, Nickolai Zeldovich, Constantine Sapuntzakis, and Monica S. Lam. 2005. The Collective: A Cache-based System Management Architecture. In Networked Systems Design & Implementation (NSDI).
[30]
Yue Chen, Yulong Zhang, Zhi Wang, and Tao Wei. 2017. Downgrade Attack on TrustZone. arXiv.
[31]
Suranjan Choudhury, Kartik Bhatnagar, and Wasim Haque. 2002. Public key infrastructure implementation and design. John Wiley & Sons, Inc.
[32]
Kees Cook. 2017. Linux Kernel Self-Protection. ; login: 42, 1 (2017), 14–17.
[33]
Kees Cook. 2018. The State of Kernel Self Protection. In Linux Conf AU.
[34]
Sam Edwards and Ioannis Profetis. 2016. Hajime: Analysis of a decentralized internet worm for IoT devices. Rapidity Networks 16(2016).
[35]
Carl Ellison and Bruce Schneier. 2000. Ten Risks of PKI: What you are not being told about Public Key Infrastructure. Computer security journal 16, 1 (2000), 1–7.
[36]
Xuan Feng, Qiang Li, Haining Wang, and Limin Sun. 2018. Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices. In USENIX Security symposium.
[37]
Alissa M Fitzgerald. 2018. The Internet of disposable things: Throwaway paper and plastic sensors will connect everyday items. IEEE Spectrum 55, 12 (2018), 30–35.
[38]
Yangchun Fu and Zhiqiang Lin. 2012. Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection. In 2012 IEEE symposium on security and privacy (IEEE SP).
[39]
Robert Gawlik and Thorsten Holz. 2018. SoK: Make JIT-Spray Great Again. In USENIX Workshop on Offensive Technologies (WOOT).
[40]
Xinyang Ge, Hayawardh Vijayakumar, and Trent Jaeger. 2014. Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture. Mobile Security Technology Workshop (MoST)(2014).
[41]
Cristiano Giuffrida, Anton Kuijsten, and Andrew S Tanenbaum. 2013. Safe and Automatic Live Update for Operating Systems. ACM SIGPLAN Notices 48, 4 (2013), 279–292.
[42]
Google Cloud Platform. 2019. Network Pricing, https://cloud.google.com/compute/network-pricing.
[43]
Mariano Graziano, Andrea Lanzi, and Davide Balzarotti. 2013. Hypervisor Memory Forensics. In Recent Advances in Intrusion Detection (RAID).
[44]
Russ Housley and Tim Polk. 2001. Planning for PKI: best practices guide for deploying public key infrastructure. John Wiley & Sons, Inc.
[45]
IEEE Internet Technology Policy Community. 2017. Internet of Things (IoT) security best practices. In IEEE Internet Technology Policy Community White Paper.
[46]
iPXE. 2010. https://ipxe.org/.
[47]
IT Cornell. 2018. Recover From a System Compromise, https://it.cornell.edu/security-essentials-it-professionals/recover-system-compromise.
[48]
ITU. 2019. Handbook for the development of a policy framework on ICT/e-waste. https://www.itu.int/en/ITU-D/Climate-Change/Documents/2018/Handbook-Policy-framework-on-ICT-Ewaste.pdf
[49]
Pushpak Jagtap, Fardin Abdi, Matthias Rungger, Majid Zamani, and Marco Caccamo. 2020. Software Fault Tolerance for Cyber-Physical Systems via Full System Restart. ACM Transactions on Cyber-Physical Systems 4, 4 (2020), 1–20.
[50]
Jin Soo Jang, Sunjune Kong, Minsu Kim, Daegyeong Kim, and Brent Byunghoon Kang. 2015. SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment. In Network and Distributed System Security Symposium (NDSS).
[51]
Yujuan Jiang, Bram Adams, and Daniel M German. 2013. Will my patch make it? And how fast? Case study on the Linux kernel. In Working Conference on Mining Software Repositories.
[52]
Stephen T Jones, Andrea C Arpaci-Dusseau, and Remzi H Arpaci-Dusseau. 2006. Antfarm: Tracking Processes in a Virtual Machine Environment. In USENIX Annual Technical Conference (USENIX ATC).
[53]
Sanidhya Kashyap, Changwoo Min, Byoungyoung Lee, Taesoo Kim, and Pavel Emelyanov. 2016. Instant OS Updates via Userspace Checkpoint-and-Restart. In USENIX Annual Technical Conference (USENIX-ATC).
[54]
Kernel Self-Protection. 2019. https://www.kernel.org/doc/html/v5.4/security/self-protection.html.
[55]
Samuel T King and Peter M Chen. 2006. SubVirt: Implementing malware with virtual machines. In IEEE Symposium on Security and Privacy (IEEE SP).
[56]
Ryozo Kiyohara, Satoshi Mii, Mitsuhiro Matsumoto, Masayuki Numao, and Satoshi Kurihara. 2009. A new method of fast compression of program code for OTA updates in consumer devices. IEEE Transactions on Consumer Electronics 55, 2 (2009), 812–817.
[57]
Andi Kleen. 2013. gcc link time optimization and the Linux kernel. In Linux Collab Summit.
[58]
Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2018. Spectre Attacks: Exploiting Speculative Execution. In arXiv.
[59]
Paul Kocher, J. Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, M. Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In IEEE Symposium on Security and Privacy (IEEE SP).
[60]
Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Jeffrey Voas. 2017. DDoS in the IoT: Mirai and Other Botnets. IEEE Computer 50, 7 (2017), 80–84.
[61]
Anil Kurmus, Reinhard Tartler, Daniela Dorneanu, Bernhard Heinloth, Valentin Rothberg, Andreas Ruprecht, Wolfgang Schröder-Preikschat, Daniel Lohmann, and Rüdiger Kapitza. 2013. Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring. In Network and Distributed System Security Symposium (NDSS).
[62]
Rongfeng Li, Liu Wang, Deying Kong, and Lan Yin. 2018. Recent progress on biodegradable materials and transient electronics. Bioactive materials 3, 3 (2018), 322–333.
[63]
LibWebSocket. 2013. https://libwebsockets.org/.
[64]
Linaro. 2020. OP-TEE Documentation. https://readthedocs.org/projects/optee/downloads/pdf/latest/
[65]
Linux Tinification. 2014. https://tiny.wiki.kernel.org.
[66]
Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, 2018. Meltdown: Reading kernel memory from user space. In USENIX Security Symposium.
[67]
Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown. In arXiv.
[68]
Aravind Machiry, Eric Gustafson, Chad Spensky, Chris Salls, Nick Stephens, Ruoyu Wang, Antonio Bianchi, Yung Ryn Choe, Christopher Kruegel, and Giovanni Vigna. 2017. Boomerang: Exploiting the semantic gap in trusted execution environments. In Network and Distributed System Security Symposium (NDSS).
[69]
Redowan Mahmud, Ramamohanarao Kotagiri, and Rajkumar Buyya. 2018. Fog computing: A taxonomy, survey and future directions. In Internet of everything. Springer, 103–130.
[70]
Artur Marzano, David Alexander, Osvaldo Fonseca, Elverton Fazzion, Cristine Hoepers, Klaus Steding-Jessen, Marcelo HPC Chaves, Ítalo Cunha, Dorgival Guedes, and Wagner Meira. 2018. The Evolution of Bashlite and Mirai IoT Botnets. In IEEE Symposium on Computers and Communications (ISCC).
[71]
Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun. 2017. ROTE: Rollback Protection for Trusted Execution. In USENIX Security Symposium.
[72]
ME Cleaner Project. 2017. https://github.com/corna/me_cleaner/.
[73]
Yasir Mehmood, Farhan Ahmad, Ibrar Yaqoob, Asma Adnane, Muhammad Imran, and Sghaier Guizani. 2017. Internet-of-Things-Based Smart Cities: Recent Advances and Challenges. IEEE Communications Magazine 55, 9 (2017), 16–24.
[74]
Mitre Challege IoT. 2017. https://www.mitre.org/research/mitre-challenge/mitre-challenge-iot.
[75]
Vivek Mohan. 2018. Disposable IoT ready to open new opportunities, https://www.networkworld.com/article/3262970/disposable-iot-ready-to-open-new-opportunities.html. NETWORK WORLD (2018).
[76]
Bernard Ngabonziza, Daniel Martin, Anna Bailey, Haehyun Cho, and Sarah Martin. 2016. TrustZone Explained: Architectural Features and Use Cases. In International Conference on Collaboration and Internet Computing (CIC).
[77]
Dennis K Nilsson and Ulf E Larson. 2008. Secure Firmware Updates over the Air in Intelligent Vehicles. In IEEE International Conference on Communications Workshops (ICC).
[78]
Zhenyu Ning and Fengwei Zhang. 2017. Ninja: Towards Transparent Tracing and Debugging on ARM. In USENIX Security symposium.
[79]
OP-TEE. 2016. https://www.op-tee.org/.
[80]
Michael Opdenacker. 2017. Embedded Linux size reduction techniques. In Embedded Linux Conference (ELC).
[81]
Himanshu Pareek, Sandeep Romana, and PRL Eswari. 2012. Application whitelisting: approaches and challenges. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT) 2, 5 (2012), 13–18.
[82]
Heejin Park, Shuang Zhai, Long Lu, and Felix Xiaozhu Lin. 2019. Streambox-TZ: secure stream analytics at the edge with trustzone. In USENIX Annual Technical Conference (USENIX ATC).
[83]
Charith Perera, Yongrui Qin, Julio C Estrella, Stephan Reiff-Marganiec, and Athanasios V Vasilakos. 2017. Fog Computing for Sustainable Smart Cities: A Survey. ACM Computing Surveys (CSUR) 50, 3 (2017), 1–43.
[84]
Andy Pfiffer. 2003. Reducing System Reboot Time With kexec. OSDL Whitepaper (2003).
[85]
Sandro Pinto and Nuno Santos. 2019. Demystifying Arm TrustZone: A Comprehensive Survey. ACM Computing Surveys (CSUR) 51, 6 (2019), 1–36.
[86]
Alessandro Reina, Aristide Fattori, Fabio Pagani, Lorenzo Cavallaro, and Danilo Bruschi. 2012. When Hardware Meets Software: A Bulletproof Solution to Forensic Memory Acquisition. In Annual Computer Security Applications Conference (ACSAC).
[87]
Ju Ren, Hui Guo, Chugui Xu, and Yaoxue Zhang. 2017. Serving at the Edge: A Scalable IoT Architecture Based on Transparent Computing. IEEE Network 31, 5 (2017), 96–105.
[88]
Reuters. 2019. China’s Xiongmai to recall up to 10,000 webcams after hack, https://www.reuters.com/article/us-cyber-attacks-china/chinas-xiongmai-to-recall-up-to-10000-webcams-after-hack-idUSKCN12P1TT.
[89]
Joanna Rutkowska. 2006. Subverting VistaTM Kernel For Fun And Profit. Black Hat USA.
[90]
Mohamed Sabt, Mohammed Achemlal, and Abdelmadjid Bouabdallah. 2015. Trusted Execution Environment: What It is, and What It is Not. In 2015 IEEE Trustcom/BigDataSE/ISPA.
[91]
Adam Sedgewick, Murugiah Souppaya, and Karen Scarfone. 2015. Guide to application whitelisting. NIST Special Publication 800 (2015).
[92]
Weisong Shi, Jie Cao, Quan Zhang, Youhuizi Li, and Lanyu Xu. 2016. Edge computing: Vision and challenges. IEEE internet of things journal 3, 5 (2016), 637–646.
[93]
Shodan. 2013. https://www.shodan.io/.
[94]
Bill Stearns. 2020. Making a Solar Powered Raspberry Pi. https://www.activecountermeasures.com/making-a-solar-powered-raspberry-pi/
[95]
Kehua Su, Jie Li, and Hongbo Fu. 2011. Smart City and the Applications. In 2011 international conference on electronics, communications and control (ICECC).
[96]
He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, and Sushil Jajodia. 2014. TrustDump: Reliable Memory Acquisition on Smartphones. In European Symposium on Research in Computer Security (ESORICS).
[97]
TCG. 2019. TPM 2.0 Authenticated Countdown Timer (ACT) Command. https://trustedcomputinggroup.org/wp-content/uploads/TCG_TPM_ACTCommand_v1r3_pubrev.pdf
[98]
Sonam Tenzin, Satetha Siyang, Theerapat Pobkrut, and Teerakiat Kerdcharoen. 2017. Low Cost Weather Station for Climate-Smart Agriculture. In 2017 9th international conference on knowledge and smart technology (KST).
[99]
Yuan Tian, Julia Lawall, and David Lo. 2012. Identifying Linux Bug Fixing Patches. In International Conference on Software Engineering (ICSE).
[100]
UC Berkeley Information Security and Policy. 2018. Reinstalling Your Compromised Computer, https://security.berkeley.edu/resources/best-practices-how-articles/compromised-systems/reinstalling-your-compromised-computer.
[101]
UCL Information Security Group. 2013. Recovering from an intrusion, https://www.ucl.ac.uk/informationsecurity/itsecurity/knowledgebase/ securitybaselines/recovering.
[102]
Jiang Wang, Angelos Stavrou, and Anup Ghosh. 2010. HyperCheck: A Hardware-Assisted Integrity Monitor. In Recent Advances in Intrusion Detection (RAID).
[103]
Xueqiang Wang, Yuqiong Sun, Susanta Nanda, and XiaoFeng Wang. 2019. Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps. In USENIX Security Symposium.
[104]
Sjaak Wolfert, Lan Ge, Cor Verdouw, and Marc-Jeroen Bogaardt. 2017. Big Data in Smart Farming–A Review. Agricultural Systems 153(2017), 69–80.
[105]
Guanping Xiao, Zheng Zheng, Bo Jiang, and Yulei Sui. 2019. An Empirical Study of Regression Bug Chains in Linux. IEEE Transactions on Reliability 69, 2 (2019), 558–570.
[106]
Meng Xu, Manuel Huber, Zhichuang Sun, Paul England, Marcus Peinado, Sangho Lee, Andrey Marochko, Dennis Mattoon, Rob Spiger, and Stefan Thom. 2019. Dominance as a New Trusted Computing Primitive for the Internet of Things. In IEEE Symposium on Security and Privacy (IEEE SP).
[107]
Fengwei Zhang, Jiang Wang, Kun Sun, and Angelos Stavrou. 2013. HyperCheck: A Hardware-Assisted Integrity Monitor. IEEE Transactions on Dependable and Secure Computing 11, 4 (2013), 332–344.
[108]
Zhi-Kai Zhang, Michael Cheng Yi Cho, Chia-Wei Wang, Chia-Wei Hsu, Chong-Kuan Chen, and Shiuhpyng Shieh. 2014. IoT Security: Ongoing Challenges and Research Opportunities. In International Conference on Service-Oriented Computing and Applications (SOCA).
[109]
Lei Zhou, Fengwei Zhang, Jinghui Liao, Zhengyu Ning, Jidong Xiao, Kevin Leach, Westley Weimer, and Guojun Wang. 2020. KShot: Live Kernel Patching with SMM and SGX. In IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[110]
Zhi Zhou, Xu Chen, En Li, Liekang Zeng, Ke Luo, and Junshan Zhang. 2019. Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing. Proc. IEEE 107, 8 (2019), 1738–1762.

Cited By

View all
  • (2024)Resilient, Auditable, and Secure IoT-Enabled Smart Inverter Firmware Amendments With BlockchainIEEE Internet of Things Journal10.1109/JIOT.2023.332195411:5(8945-8960)Online publication date: 1-Mar-2024
  • (2024)Regaining Dominance in CIDER and LazarusIEEE Access10.1109/ACCESS.2024.345455512(124589-124603)Online publication date: 2024
  • (2024)TEE-PA: TEE Is a Cornerstone for Remote Provenance Auditing on Edge Devices With Semi-TCBIEEE Access10.1109/ACCESS.2024.336634412(26536-26549)Online publication date: 2024
  • Show More Cited By

Index Terms

  1. Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image ACM Other conferences
          ACSAC '20: Proceedings of the 36th Annual Computer Security Applications Conference
          December 2020
          962 pages
          ISBN:9781450388580
          DOI:10.1145/3427228
          Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 08 December 2020

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. Life Cycle Management
          2. Public Key Infrastructure (PKI)
          3. Reboot-Oriented IoT
          4. Trusted Execution Environment (TEE)

          Qualifiers

          • Research-article
          • Research
          • Refereed limited

          Conference

          ACSAC '20

          Acceptance Rates

          Overall Acceptance Rate 104 of 497 submissions, 21%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)64
          • Downloads (Last 6 weeks)8
          Reflects downloads up to 10 Nov 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Resilient, Auditable, and Secure IoT-Enabled Smart Inverter Firmware Amendments With BlockchainIEEE Internet of Things Journal10.1109/JIOT.2023.332195411:5(8945-8960)Online publication date: 1-Mar-2024
          • (2024)Regaining Dominance in CIDER and LazarusIEEE Access10.1109/ACCESS.2024.345455512(124589-124603)Online publication date: 2024
          • (2024)TEE-PA: TEE Is a Cornerstone for Remote Provenance Auditing on Edge Devices With Semi-TCBIEEE Access10.1109/ACCESS.2024.336634412(26536-26549)Online publication date: 2024
          • (2024)DICEguard: enhancing DICE security for IoT devices with periodic memory forensicsThe Journal of Supercomputing10.1007/s11227-024-06194-780:13(19824-19844)Online publication date: 29-May-2024
          • (2024)Profiling with trust: system monitoring from trusted execution environmentsDesign Automation for Embedded Systems10.1007/s10617-024-09283-128:1(23-44)Online publication date: 1-Mar-2024
          • (2023)SoK: A Systematic Review of TEE Usage for Developing Trusted ApplicationsProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3600169(1-15)Online publication date: 29-Aug-2023
          • (2023)Security and Privacy on 6G Network Edge: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2023.324467425:2(1095-1127)Online publication date: 1-Apr-2023
          • (2023)Anonymous Broadcast Authentication With One-to-Many Transmission to Control IoT DevicesIEEE Access10.1109/ACCESS.2023.328833711(62955-62969)Online publication date: 2023
          • (2023)IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-designated Verifier SignaturesInformation Security Practice and Experience10.1007/978-981-99-7032-2_7(105-122)Online publication date: 24-Aug-2023
          • (2022)Spacelord: Private and Secure Smart Space SharingProceedings of the 38th Annual Computer Security Applications Conference10.1145/3564625.3564637(427-439)Online publication date: 5-Dec-2022
          • Show More Cited By

          View Options

          Get Access

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format.

          HTML Format

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media