Embedded, smart, and IoT devices are increasingly popular in numerous
ev...
As many types of IoT devices worm their way into numerous settings and m...
Widespread adoption and growing popularity of embedded/IoT/CPS devices m...
For nearly two decades, CAPTCHAs have been widely used as a means of
pro...
To date, there has been no systematic investigation of thermal profiles ...
Guaranteeing runtime integrity of embedded system software is an open
pr...
There are many well-known techniques to secure sensed data in IoT/CPS
sy...
We address the challenging problem of efficient trust establishment in
c...
Demonstrating the veracity of videos is a longstanding problem that has
...
Recent data protection regulations (such as GDPR and CCPA) grant consume...
Verifying integrity of software execution in low-end micro-controller un...
In this paper, we set out to systematically design a minimal active RoT ...
The design of tiny trust anchors has received significant attention over...
Root of Trust Identification (RTI) refers to determining whether a given...
Preventing abuse of web services by bots is an increasingly important
pr...
We propose Remote Attestation with TOCTOU Avoidance (RATA): a provably s...
Security and privacy of the Internet Domain Name System (DNS) have been
...
Modern society is increasingly surrounded by, and accustomed to, a wide ...
This paper studies leakage of user passwords and PINs based on observati...
In this work, we take the first step towards formal verification of RA b...
Secure firmware update is an important stage in the IoT device life-cycl...
As a warm-blooded mammalian species, we humans routinely leave thermal
r...
Content-Centric Networking (CCN) is an internetworking paradigm that off...