2016
DOI: 10.1007/978-3-319-45741-3_17
|View full text |Cite
|
Sign up to set email alerts
|

Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 23 publications
0
16
0
Order By: Relevance
“…Perito and Tsudik [40] used PoSE to propose a practical approach to secure erasure and code update in embedded devices and evaluated the scheme's feasibility in commodity sensors. Kohnhauser and Katzenbeisser [58] presented a code update scheme which verifier can enforce the correct distribution and installation of code updates on all devices in the network. Especially the scheme allowed the administrator to provide secure code updates for a group of devices.…”
Section: Control Flow Integritymentioning
confidence: 99%
“…Perito and Tsudik [40] used PoSE to propose a practical approach to secure erasure and code update in embedded devices and evaluated the scheme's feasibility in commodity sensors. Kohnhauser and Katzenbeisser [58] presented a code update scheme which verifier can enforce the correct distribution and installation of code updates on all devices in the network. Especially the scheme allowed the administrator to provide secure code updates for a group of devices.…”
Section: Control Flow Integritymentioning
confidence: 99%
“…For constrained devices, several secure update mechanisms have been proposed, mainly for sensor networks in combination with attestation [1,14,20,23,36,40,41]. After trying to distribute the update, the server requests an attestation proof of successful update application.…”
Section: Related Workmentioning
confidence: 99%
“…Trusted Execution Environments (TEEs), remote attestation schemes, etc. have been proposed by both the industry [74] and academia [8,18,24,30,39,44,63,64]. To narrow the focus, remote attestation (RA) has recently emerged as the central means to detect malware presence on remote low-end devices.…”
Section: Problem Statementmentioning
confidence: 99%
“…SPEED [8] is an approach to secure verifiable erasure for Class-1 IoT devices [17] which tackles the shortcomings of PoSE by building on top of a software-based memory isolation technique along with a distance bounding protocol, ruling out the assumption of jamming nearby devices. The work in [44] presents a verifiable code update scheme for a swarm of low-end embedded devices which verifies and enforces the correct installation of code updates on all devices in the network, considering that each device in the network should maintain minimal hardware requirements which are represented by a ROM and secure storage. ASSURED [13] is a hybrid-based scalable architecture for secure software updates of embedded devices, which extends and outperforms TUF [61], the popular state-ofthe-art secure update mechanism.…”
Section: Secure Erasure Recovery and Code Updatementioning
confidence: 99%