3,666 research outputs found

    FPGA based remote code integrity verification of programs in distributed embedded systems

    Get PDF
    The explosive growth of networked embedded systems has made ubiquitous and pervasive computing a reality. However, there are still a number of new challenges to its widespread adoption that include scalability, availability, and, especially, security of software. Among the different challenges in software security, the problem of remote-code integrity verification is still waiting for efficient solutions. This paper proposes the use of reconfigurable computing to build a consistent architecture for generation of attestations (proofs) of code integrity for an executing program as well as to deliver them to the designated verification entity. Remote dynamic update of reconfigurable devices is also exploited to increase the complexity of mounting attacks in a real-word environment. The proposed solution perfectly fits embedded devices that are nowadays commonly equipped with reconfigurable hardware components that are exploited to solve different computational problems

    Securing Internet Protocol (IP) Storage: A Case Study

    Full text link
    Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast. Today, there are many potential threats that are targeted at storage networks, including data modification, destruction and theft, DoS attacks, malware, hardware theft and unauthorized access, among others. In order for a Storage Area Network (SAN) to be secure, each of these threats must be individually addressed. In this paper, we present a comparative study by implementing different security methods in IP Storage network.Comment: 10 Pages, IJNGN Journa

    Design of a Secure Transmission System for Secure Key Injection During Initialization Phase of IOT Devices

    Get PDF
    In the last decade society has experienced an exponential growth in the number of devices connected to the Internet. Recently, new gadgets called Internet of Things devices have appeared in our homes. Although they often lack a physical interface to directly interact with them, they are able to read information from sensors and autonomously communicate with servers, performing decisions accordingly. However, most of the domestic devices that are being commercialized do not implement strict security policies, potentially leading to security breaches that compromise the user’s privacy. The following work provides an alternative to the WPS technology in the initial setup phase of these devices, in which the gadget has to be loaded with the Wi-Fi key so it can connect to the Internet. The use of infrared technology implementing a Diffie-Hellman key exchange protocol to inject this key makes the process much safer, without compromising the cost of the device or the user experience

    TESTING FOR CORRECTNESS AND REBASELINING OF IMAGES

    Get PDF
    An image correctness testing system compares an expected image with an image generated at a device. The system transmits the expected image to the device. The system then analyzes the image that is generated at the device in order to determine a checksum of the image generated at the device. The system further compares the checksum of the image generated at the device with a checksum of the expected image and presents a difference to a user on a web interface. The system can then receive an input from the user to rebaseline the image generated at the device and/or the expected image. On receiving the user input, the system updates the checksum of the expected image equal to the checksum of the image generated at the device or vice versa
    corecore