Login / Signup

Verify&Revive: Secure Detection and Recovery of Compromised Low-end Embedded Devices.

Mahmoud AmmarBruno Crispo
Published in: ACSAC (2020)
Keyphrases
  • embedded devices
  • low end
  • embedded systems
  • high end
  • mobile devices
  • security protocols
  • security issues
  • databases
  • data analysis
  • low bit rate
  • key management
  • limited memory