June 8, 2022, 1:20 a.m. | Adam Caulfield, Norrathep Rattanavipanon, Ivan De Oliveira Nunes

cs.CR updates on arXiv.org arxiv.org

Embedded devices are increasingly ubiquitous and their importance is hard to
overestimate. While they often support safety-critical functions (e.g., in
medical devices and sensor-alarm combinations), they are usually implemented
under strict cost/energy budgets, using low-end microcontroller units (MCUs)
that lack sophisticated security mechanisms. Motivated by this issue, recent
work developed architectures capable of generating Proofs of Execution (PoX)
for the correct/expected software in potentially compromised low-end MCUs. In
practice, this capability can be leveraged to provide "integrity from birth" to …

embedded embedded systems operations simple systems

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

COMM Penetration Tester (PenTest-2), Chantilly, VA OS&CI Job #368

@ Allen Integrated Solutions | Chantilly, Virginia, United States

Consultant Sécurité SI H/F Gouvernance - Risques - Conformité

@ Hifield | Sèvres, France

Infrastructure Consultant

@ Telefonica Tech | Belfast, United Kingdom