OAT - Attesting Operation Integrity of Embedded Devices

OAT - Attesting Operation Integrity of Embedded Devices

IEEE Symposium on Security and Privacy via YouTube Direct link

Intro

1 of 24

1 of 24

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

OAT - Attesting Operation Integrity of Embedded Devices

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 The unverifiable (blind) trust
  3. 3 Existing solutions -- attestation
  4. 4 Example: vulnerable robotic arm
  5. 5 Our Solution
  6. 6 OEI (Operation Exec. Integrity)
  7. 7 OEI: two sub-properties
  8. 8 Attestation Challenges
  9. 9 OAT (OEI Attestation Framework)
  10. 10 Threat model
  11. 11 Operations
  12. 12 CFI Attestation
  13. 13 Intuitive measurement schemes
  14. 14 A hybrid scheme
  15. 15 Measurement Collection & Verification
  16. 16 Critical variable identification
  17. 17 Existing data integrity checks
  18. 18 Def-Use Value Integrity (DVI)
  19. 19 Implementation notes
  20. 20 Tests on real embedded firmware
  21. 21 Micro Performance Tests
  22. 22 Comparisons
  23. 23 Security Tests & Analysis
  24. 24 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.