Strong authentication on smart wireless devices. (arXiv:2208.03541v1 [cs.CR])
The rapid deployment of wireless technologies has given rise to the current situation where mobile phones and other wireless devices have become essential elements in all types of activities, including…
On the Fundamental Limits of Formally (Dis)Proving Robustness in Proof-of-Learning. (arXiv:2208.03567v1 [cs.LG])
Proof-of-learning (PoL) proposes a model owner use machine learning training checkpoints to establish a proof of having expended the necessary compute for training. The authors of PoL forego cryptographic approaches…
Cyber Pirates Ahoy! An Analysis of Cybersecurity Challenges in the Shipping Industry. (arXiv:2208.03607v1 [cs.CR])
Maritime shipping has become a trillion-dollar industry that now impacts the economy of virtually every country around the world. It is therefore no surprise that countries and companies have spent…
An Enclave-based TEE for SE-in-SoC in RISC-V Industry. (arXiv:2208.03631v1 [cs.CR])
Secure Element (SE) in SoC sees an increasing adoption in industry. Many applications in IoT devices are bound to the SE because it provides strong cryptographic functions and physical protection.…
IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures. (arXiv:2208.03781v1 [cs.CR])
IoT technology has been developing rapidly, while at the same time, it raises cybersecurity concerns. Mirai, a notorious IoT malware, is one of the representative threats; it infects many IoT…
An Enclave-based TEE for SE-in-SoC in RISC-V Industry. (arXiv:2208.03631v1 [cs.CR])
Secure Element (SE) in SoC sees an increasing adoption in industry. Many applications in IoT devices are bound to the SE because it provides strong cryptographic functions and physical protection.…
CoVault: A Secure Analytics Platform. (arXiv:2208.03784v1 [cs.CR])
In a secure analytics platform, data sources consent to the exclusive use of their data for a pre-defined set of analytics queries performed by a specific group of analysts, and…
IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures. (arXiv:2208.03781v1 [cs.CR])
IoT technology has been developing rapidly, while at the same time, it raises cybersecurity concerns. Mirai, a notorious IoT malware, is one of the representative threats; it infects many IoT…
CoVault: A Secure Analytics Platform. (arXiv:2208.03784v1 [cs.CR])
In a secure analytics platform, data sources consent to the exclusive use of their data for a pre-defined set of analytics queries performed by a specific group of analysts, and…
HWGN2: Side-channel Protected Neural Networks through Secure and Private Function Evaluation. (arXiv:2208.03806v1 [cs.CR])
Recent work has highlighted the risks of intellectual property (IP) piracy of deep learning (DL) models from the side-channel leakage of DL hardware accelerators. In response, to provide side-channel leakage…