2020
DOI: 10.1155/2020/8957641
|View full text |Cite
|
Sign up to set email alerts
|

RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device

Abstract: Software attacks like worm, botnet, and DDoS are the increasingly serious problems in IoT, which had caused large-scale cyber attack and even breakdown of important information infrastructure. Software measurement and attestation are general methods to detect software integrity and their executing states in IoT. However, they cannot resist TOCTOU attack due to their static features and seldom verify correctness of control flow integrity. In this paper, we propose a novel and practical scheme for software trust… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…If you rely only on static measurements, the safety of the system is not guaranteed. For example, static measurements are not able to handle TOU-TOC (time of use-time of check) attacks [21,41,43], where the process remains unafected before the measurement but is destroyed afterwards. Only with the help of dynamic measurement and the defnition of an appropriate measurement period can we ensure the security of the system during runtime.…”
Section: Dynamic Measurementmentioning
confidence: 99%
See 2 more Smart Citations
“…If you rely only on static measurements, the safety of the system is not guaranteed. For example, static measurements are not able to handle TOU-TOC (time of use-time of check) attacks [21,41,43], where the process remains unafected before the measurement but is destroyed afterwards. Only with the help of dynamic measurement and the defnition of an appropriate measurement period can we ensure the security of the system during runtime.…”
Section: Dynamic Measurementmentioning
confidence: 99%
“…Te REE can only access the resources of REE and cannot access the resources of the TEE [16]. Terefore, researchers [15,[17][18][19][20][21] often take advantage of the security of the TEE by setting up measurement modules in it. In this way, the resources in the REE are measured regularly to ensure their security.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Other threats can affect all three domains at once. e 5G-enabled IoT device security system is made up of the following fundamentals: operators, manufacturers, and other stakeholders develop [23] norms for how global networks interact through standards. is entails evaluating the best ways to protect IoT device networks and people from malicious attacks.…”
Section: G-enabled Iot Network and Device Securitymentioning
confidence: 99%
“…Zhao et al [20] presented an RoT by using Physical Unclonable Function (PUF), which is based on Static Random Access Memory (SRAM) to provide better secure storage. Qin et al [21] proposed a TEE by combining dynamic measurement and integrity flow control with a PUF device for storing keys and returning program functions' addresses. Benhani et al [22] evaluated the security of ARM TrustZone in Field-Programmable Gate Array (FPGA), thus recommending isolation between secure IPs and non-secure IPs to evade various kinds of attack models.…”
Section: Introductionmentioning
confidence: 99%