Has My IoT Device Been Hacked? Establishing Trust w/ Remote Attestation • Edlira Dushku • GOTO 2023
This presentation was recorded at GOTO Aarhus 2023. #GOTOcon #GOTOaar
Edlira Dushku - Assistant Professor in Cyber Security at Aalborg University
RESOURCES
ABSTRACT
IoT devices are becoming more prevalent in our daily lives, with applications ranging from smart homes to industrial automation systems. These devices are often connected to sensitive information and resources and are vulnerable to a wide range of security threats. For example, an adversary can use IoT devices to disrupt their operation, steal sensitive information, or gain unauthorized access to resources, and the consequence could be fatal.
Aimed at providing integrity guarantees, Remote Attestation (RA) has been proposed as a security technique that allows a remote entity to verify the trustworthiness of a potentially compromised device. RA checks the software integrity and detects unexpected modifications in device configuration. In particular, RA allows an untrusted device to generate reliable evidence about the current state and convince a remote Verifier that the device is running legitimate software. RA can be used to respond to security threats to minimize the impact of security breaches and ensure that devices are operating securely.
The RA protocols proposed in the literature make different assumptions regarding device architectures, attack scenarios, and security requirements. This talk first gives a brief introduction to IoT security and Remote Attestation. Then, it presents the most significant RA schemes in the IoT domain, including a three-fold discussion, (1) reviewing the working mechanisms of the state-of-the-art RA techniques in the IoT domain, (2) discussing the attestation mechanisms for IoT swarms, (3) presenting future challenges and promising research directions. [...]
TIMECODES
00:00 Intro
01:37 Agenda
02:27 IoT security
12:08 Remote attestation protocols
32:27 Open challenges
39:00 Conclusions
39:54 Outro
Download slides and read the full abstract here:
RECOMMENDED BOOKS
Aaron Parecki • OAuth 2.0 Simplified •
Aaron Parecki • OAuth 2.0 Servers •
Aaron Parecki • The Little Book of OAuth 2.0 RFCs •
Erdal Ozkaya • Cybersecurity: The Beginner’s Guide •
Richer & Sanso • OAuth 2 in Action •
Wilson & Hingnikar • Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 •
#IoT #Security #Cybersecurity #RemoteAttestation #RA #Programming #SoftwareEngineering #EdliraDushku #SecurityByDesign #AdversaryModels #SEDA #Privacy
Looking for a unique learning experience?
Attend the next GOTO conference near you! Get your ticket at
Sign up for updates and specials at
SUBSCRIBE TO OUR CHANNEL - new videos posted almost daily.
1 view
0
0
22 hours ago 07:10:32 1
У края бездны-(2024) все серии 1-4. Освобождение Мариуполя.Причитайте ограничения в описании ниже!!
2 days ago 00:04:34 1
Those Who Found the Tree of Life—the Secret in Eden | WMSCOG, Church of God
2 days ago 00:04:58 2
My People Whom I Acknowledge | WMSCOG, Church of God
3 days ago 00:04:50 19
In The Army Now (Status Quo) • Drum Cover
5 days ago 00:08:55 1
SHOCKING Dogfight Over UKRAINE: F-16, Mig-29, and Su-27 Did Not Survive Their Meet-Up With Su-57M
5 days ago 00:09:56 1
Mother Tucker: The Donald Trump & Jared Kushner Family Business Suckled From The Tit Of Saudi Arabia
6 days ago 00:01:13 4
My journey to you - attracted by Gong Shangjue‘s sharp eyes
1 week ago 00:00:42 7
Это самая невероятная разборка на дороге 🧸🤷♂️
2 weeks ago 01:07:28 1
This Joe Rogan Controversy Has Now Become A Huge Deal..
3 weeks ago 00:14:08 3
U.S. Nightmare Became a REALITY: Russia Took Iran Under Its Military and Economic Protection
3 weeks ago 00:28:16 1
🌈 Discoveries of Great Tailors. Let’s Expose their Forbidden Tricks! (Part #35)
3 weeks ago 00:12:14 1
Часть 2 Вовка из Тридевятого царства своими руками/Vovka from the Faraway Kingdom with his own hands
3 weeks ago 00:03:53 1
Freya Ridings - Lost Without You (Live At Hackney Round Chapel)