2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS) 2017
DOI: 10.1109/mwscas.2017.8053108
|View full text |Cite
|
Sign up to set email alerts
|

Study of secure boot with a FPGA-based IoT device

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 27 publications
(9 citation statements)
references
References 3 publications
0
9
0
Order By: Relevance
“…IoT has become a popular term around the globe. 18,19 Although IoT systems have brought convenience to users, they also cause huge security risks. 20,21 The risks of IoT software are immeasurable.…”
Section: Iot Software-based Methodsmentioning
confidence: 99%
“…IoT has become a popular term around the globe. 18,19 Although IoT systems have brought convenience to users, they also cause huge security risks. 20,21 The risks of IoT software are immeasurable.…”
Section: Iot Software-based Methodsmentioning
confidence: 99%
“…It starts with a first-stage Boot ROM that is synthesized into gates. A device with secure boot [129,138] enabled will first verify whether the firmware is digitally signed when it starts, and the firmware will check the digital signature of the bootloader to verify that it has not been modified. The bootloader of a trusted boot-enabled device verifies its digital signature before loading the kernel.…”
Section: The Root Of Trust and The Hardware Security Modulementioning
confidence: 99%
“…Robust security mechanisms such as industry standard encryption techniques need to be considered for authentication and identification of all Fog entities. One solution is secure boot [13] that prevents over-the-air firmware updates from unrecognized sources (e.g., malicious nodes). This helps tackle challenge C5.…”
Section: S6 -Security Mechanismsmentioning
confidence: 99%