Hardware‐assisted remote attestation design for critical embedded systems
Abstract Remote attestation, as a challenge‐response protocol, enables a trusted entity, called verifier, to ask a potentially infected device, called prover, to provide integrity assurance about its internal state. Remote attestation is becoming increasingly vital for embedded systems that serve in...
Saved in:
| Main Authors: | Munir Geden, Kasper Rasmussen |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2023-05-01
|
| Series: | IET Information Security |
| Subjects: | |
| Online Access: | https://doi.org/10.1049/ise2.12113 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Design and validation for a remote attestation security protocol
by: WANG Dan, et al.
Published: (2009-01-01) -
Method of designing security protocol for remote attestation
by: YU Rong-wei1, et al.
Published: (2008-01-01) -
Method of designing security protocol for remote attestation
by: YU Rong-wei1, et al.
Published: (2008-01-01) -
USING ePKI TECHNOLOGY TO SECURELY UPDATE OF EMBEDDED SOFTWARE OF TRUSTED HARDWARE AND SOFTWARE SYSTEM
by: Oleg N. Dyakov, et al.
Published: (2025-05-01) -
Enhancing Reliability in Embedded Systems Hardware: A Literature Survey
by: Ryan Aalund, et al.
Published: (2025-01-01)