bp24

Secure Authentication Using Context

Authors: Hamid Dashtbani, PhD student at University of Würzburg Traditional authentication methods such as certificates and cryptographic keys remain vulnerable to a range of attacks…
bp23

Achieving persistent tagging for robust stack memory error protection

Authors: Carlo Ramponi, Ph.D. Student at University of Trento  Why Memory Safety Still MattersDespite decades of research, memory safety remains the number one source of critical…
bp22

Many TEEs, One Hypervisor: Enhancing Cross-Platform Security and Interoperability

Authors: João Sousa, PhD Student at UMINHOTiago Gomes, Assistant Professor at UMINHOIn many IoT systems, various devices coexist, presenting an ongoing challenge to ensure they all provide the…
bp20

Fuzzing the Future: How AI is Transforming Hardware Security Evaluation

Authors: Nikhilesh Singh, Postdoc at TU DarmstadtHuimin Li, Postdoc at TU DarmstadtLichao Wu Postdoc at TU DarmstadtMohamadreza Rostami, PhD Student at TU DarmstadtProf. Dr.-Ing. Ahmad-Reza…
bp18a

AuthentiSafe: A Milestone in the CROSSCON Project for IoT Authentication

Author: Christoph Sendner, Chair of Software Engineering (Informatik II) at UWUAuthentiSafe is a pivotal result of the CROSSCON project, which was created to enhance security and efficiency in…
bp19

Ensuring Secure IoT Systems: CROSSCON’s Approach to Security Testing

Author: Ákos Milánkovich, Security Analyst at SEARCH-LAB The ever-growing Internet of Things (IoT) ecosystem presents a double-edged sword: while it enables groundbreaking applications, it…
bp17

Ensuring Memory Safety for Trusted Applications through Secure Compilation

Author: Alberto Tacchella, Post-doctoral at Uni. Trento A Trusted Application (TA) is an application running in a Trusted Execution Environment (TEE) that implements a security-critical…
bp17

TEE vulnerabilities, are you still there?

Author: João Sousa, University of Minho TrustZone is an Arm hardware technology widely adopted in billions of mobile devices [2] and, more recently, in industrial control systems [3] and servers…