|
[1] Tinshu Sasi et al. “A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges”. Journal of Information and Intelligence (2023). issn: 2949-7159. doi: https://doi.org/10.1016/j.jiixd.2023.12. 001. URL: https://www.sciencedirect.com/science/article/ pii/S2949715923000793. [2] Dorottya Papp, Zhendong Ma, and Levente Buttyan. “Embedded systems security: Threats, vulnerabilities, and attack taxonomy”. 2015 13th Annual Conference on Privacy, Security and Trust (PST). 2015, pp. 145–152. doi: 10.1109/ PST.2015.7232966. [3] Mohamed Razmy Mohamed Kasim. “Security of The Embedded and IoT Systems: Threats, Attacks, and Countermeasures”. 2021. url: https://api.semanticscholar.org/CorpusID:237345137. [4] Andy Greenberg. Hackers Remotely Kill a Jeep on the Highway—With Me in It. 2015. url: https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/. [5] Michael Bartock et al. Hardware-Enabled Security: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases. Tech. rep. NIST Interagency or Internal Reports (IR) 8320. Gaithersburg, MD: National Institute of Standards and Technology, 2022. doi: 10.6028/NIST.IR.8320. [6] Biometrics | Android Open Source Project. 2024. url: https://source.android.com/docs/security/features/biometric. [7] Gal Beniamini. QSEE privilege escalation vulnerability and exploit (CVE-2015-6639). 2016. url: https://bits- please.blogspot.com/2016/05/qsee-privilege-escalation-vulnerability.html. [8] The RISC-V Instruction Set Manual Volume II: Privileged Architecture. RISC-V Foundation. 2024. [9] Dayeol Lee et al. “Keystone: An Open Framework for Architecting Trusted Execution Environments”. Proceedings of the Fifteenth European Conference on Computer Systems. EuroSys ’20. 2020. [10] Erhu Feng et al. “Scalable Memory Protection in the PENGLAI Enclave”. 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI21). USENIX Association, July 2021, pp. 275–294. isbn: 978-1-939133-22-9. url: https://www.usenix.org/conference/osdi21/presentation/feng. [11] Gal Beniamini. Android linux kernel privilege escalation vulnerability and exploit (CVE-2014-4322). 2015. url: http://bits-please.blogspot.com/2015/08/android-linux-kernel-privilege.html. [12] Mohamed Sabt, Mohammed Achemlal, and Abdelmadjid Bouabdallah. “Trusted Execution Environment: What It is, and What It is Not”. 2015 IEEE Trustcom/BigDataSE/ISPA. Vol. 1. 2015, pp. 57–64. doi: 10.1109/Trustcom.2015.357. [13] Learn the architecture - TrustZone for AArch64. Arm. 2024. [14] ARMv6-M Architecture Reference Manual. Arm. 2010. [15] Wei Zhou et al. Good Motive but Bad Design: Why ARM MPU Has Become an Outcast in Embedded Systems. 2019. arXiv: 1908.03638 [cs.CR]. [16] Armv8-M Memory Model and Memory Protection User Guide. Arm. 2022. [17] PMP Enhancements for memory access and execution prevention on Machine mode (Smepmp). RISC-V TEE Task Group. 2021. [18] RISC-V IOPMP Architecture Specification. RISC-V IOPMP Task Group. 2024. [19] Jakub Szefer. “Principles of Secure Processor Architecture Design”. 1st ed. Springer Cham, Oct. 2018. Chap. 1, pp. 1–2. [20] Michele Grisafi, Mahmoud Ammar, and Bruno Crispo. “On the (in)security of Memory Protection Units : A Cautionary Note”. 2022 IEEE International Conference on Cyber Security and Resilience (CSR). 2022, pp. 157–162. doi: 10.1109/CSR54599.2022.9850322. [21] Deukjo Hong et al. “LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors”. Jan. 2013, pp. 3–27. isbn: 978-3-319-05148-2. doi: 10.1007/978-3-319-05149-9_1. |