Proceedings of the 15th ACM Asia Conference on Computer and Communications Security 2020
DOI: 10.1145/3320269.3384723
|View full text |Cite
|
Sign up to set email alerts
|

The Lazarus Effect: Healing Compromised Devices in the Internet of Small Things

Abstract: We live in a time when billions of IoT devices are being deployed and increasingly relied upon. This makes ensuring their availability and recoverability in case of a compromise a paramount goal. The large and rapidly growing number of deployed IoT devices make manual recovery impractical, especially if the devices are dispersed over a large area. Thus, there is a need for a reliable and scalable remote recovery mechanism that works even after attackers have taken full control over devices, possibly misusing t… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…Hardware Watchdog: Hardware watchdogs are widespread on IoT devices and are an established mechanism to react to a critical event [63][64][65][66]. We ensure that the TM TA is scheduled regularly by employing a hardware watchdog in the secure world.…”
Section: Trusted Monitormentioning
confidence: 99%
“…Hardware Watchdog: Hardware watchdogs are widespread on IoT devices and are an established mechanism to react to a critical event [63][64][65][66]. We ensure that the TM TA is scheduled regularly by employing a hardware watchdog in the secure world.…”
Section: Trusted Monitormentioning
confidence: 99%
“…However, if the device runs malware the malware may ensure that the device never resets. In order to overcome this problem, an additional mechanism is required allowing the backend to enforce a device reset as proposed in [33,67]. In these papers, the authors propose the usage of an Authenticated Watchdog Timer (AWDT) which causes the device to reset if the backend stops issuing authenticated tokens.…”
Section: Countermeasuresmentioning
confidence: 99%
“…In these papers, the authors propose the usage of an Authenticated Watchdog Timer (AWDT) which causes the device to reset if the backend stops issuing authenticated tokens. However, this approach has higher hardware requirements -either an additional coprocessor [67] or a Trusted Execution Environment (TEE), e.g., TrustZone-M [33]. Additionally, a reset may be disturbing in real applications.…”
Section: Countermeasuresmentioning
confidence: 99%

A TOCTOU Attack on DICE Attestation

Hristozov,
Wettermann,
Huber
2022
Preprint
Self Cite