2024
DOI: 10.1007/s10617-024-09283-1
|View full text |Cite
|
Sign up to set email alerts
|

Profiling with trust: system monitoring from trusted execution environments

Christian Eichler,
Jonas Röckl,
Benedikt Jung
et al.

Abstract: Large-scale attacks on IoT and edge computing devices pose a significant threat. As a prominent example, Mirai is an IoT botnet with 600,000 infected devices around the globe, capable of conducting effective and targeted DDoS attacks on (critical) infrastructure. Driven by the substantial impacts of attacks, manufacturers and system integrators propose Trusted Execution Environments (TEEs) that have gained significant importance recently. TEEs offer an execution environment to run small portions of code isolat… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
references
References 48 publications
0
0
0
Order By: Relevance