Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security 2017
DOI: 10.1145/3052973.3053010
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Swarm Attestation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

3
59
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 57 publications
(62 citation statements)
references
References 17 publications
3
59
0
Order By: Relevance
“…Prover Capability Requirements and Assumptions. In line with all the previous works in swarm attestation [5,7,11,21], and in particular according to very recent works on non-interactive attestation [22], we assume each device presents the following minimal features: (i) A Read-Only Memory (ROM), where integrity-protected attestation code should reside; (ii) A Memory Protection Unit (MPU), that allows to enforce access control on areas of the memory, e.g., readonly access to certain memory areas exclusively to attestation protocol code [18]; Fig. 1: Target system model for PADS.…”
Section: Security Modelsupporting
confidence: 89%
See 4 more Smart Citations
“…Prover Capability Requirements and Assumptions. In line with all the previous works in swarm attestation [5,7,11,21], and in particular according to very recent works on non-interactive attestation [22], we assume each device presents the following minimal features: (i) A Read-Only Memory (ROM), where integrity-protected attestation code should reside; (ii) A Memory Protection Unit (MPU), that allows to enforce access control on areas of the memory, e.g., readonly access to certain memory areas exclusively to attestation protocol code [18]; Fig. 1: Target system model for PADS.…”
Section: Security Modelsupporting
confidence: 89%
“…While resolving most of the major shortcomings of SEDA, SANA still requires full connectivity among devices; moreover, it introduces severe overhead on low-end provers. More recently, [11] propose two remote attestation protocols that improve SEDA with respect to scalability and resiliency to hardware attacks. However, [11] requires full connectivity among devices for the whole attestation process.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations