Counteracting software integrity attacks on IoT devices with remote attestation: a prototype.
Diana Gratiela BerbecaruSilvia SisinniPublished in: ICSTCC (2022)
Keyphrases
- remote attestation
- embedded systems
- computing platform
- cloud computing
- security protocols
- trusted computing
- virtual machine
- key management
- low cost
- software systems
- trusted platform module
- security mechanisms
- computer security
- management system
- mobile devices
- distributed computing
- development environment
- computing systems
- software architecture
- computer systems
- software development
- parallel computing
- software developers
- database
- data management
- user interface
- shared memory
- resource constrained
- web services
- databases