Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Raz Ben yehuda"'
Publikováno v:
Applied Sciences, Vol 12, Iss 5, p 2669 (2022)
This paper presents an improvement of control flow attestation (C-FLAT) for Linux. C-FLAT is a control attestation system for embedded devices. It was implemented as a software executing in ARM’s TrustZone on bare-metal devices. We extend the desig
Externí odkaz:
https://doaj.org/article/c798efc7f4e9421f8ce5bf0eeec14425
Publikováno v:
Applied Sciences; Volume 12; Issue 5; Pages: 2669
This paper presents an improvement of control flow attestation (C-FLAT) for Linux. C-FLAT is a control attestation system for embedded devices. It was implemented as a software executing in ARM’s TrustZone on bare-metal devices. We extend the desig
ARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the system. In this paper, we pr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fcc65327671678adbb01926c4de596e6
http://urn.fi/URN:NBN:fi:jyu-202201241258
http://urn.fi/URN:NBN:fi:jyu-202201241258
Autor:
Nezer Jacob Zaidenberg, Raz Ben Yehuda
Publikováno v:
International Journal of Information Security. 19:39-51
With the advent of the mobile industry, we face new security challenges. ARM architecture is deployed in most mobile phones, homeland security, IoT, autonomous cars and other industries, providing a hypervisor API (via virtualization extension techno
Publikováno v:
Communications in Computer and Information Science ISBN: 9783030494421
ICISSP (Revised Selected Papers)
ICISSP (Revised Selected Papers)
Memory acquisition is a tool used in advanced forensics and malware analysis. Various methods of memory acquisition exist. Such solutions are ranging from tools based on dedicated hardware to software-only solutions. We proposed a hypervisor based me
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::aaf73ec8b6a898834ae7db0025af7941
https://doi.org/10.1007/978-3-030-49443-8_15
https://doi.org/10.1007/978-3-030-49443-8_15
Publikováno v:
Network and System Security ISBN: 9783030657444
NSS
NSS
Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2e5e855b9370986a35f8db50a5712f9e
https://doi.org/10.1007/978-3-030-65745-1_5
https://doi.org/10.1007/978-3-030-65745-1_5
Many scenarios such as DRM, payments, and homeland security require a trusted and verified trusted execution environment (TEE) on ARM. In most cases such TEE should be available in source code mode. The vendor cannot conduct code review and ensure th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::74325de0a9f567fffbe4d3e5df43fd14
https://doi.org/10.4018/978-1-5225-9715-5.ch079
https://doi.org/10.4018/978-1-5225-9715-5.ch079
Autor:
Raz Ben Yehuda, Nezer Jacob Zaidenberg
Publikováno v:
International Journal of Embedded Systems. 15:289
Publikováno v:
SYSTOR
This paper presents the implementation of a malware trap device. We created a virtual usb device through the use of microvisor on the ARM platform.
Publikováno v:
Forensic Science International: Digital Investigation. 37:301106
Cyber forensics use memory acquisition in advanced forensics and malware analysis. We propose a hypervisor based memory acquisition tool. Our implementation extends the volatility memory forensics framework by reducing the processor's consumption, so