San Jose, CA, USA, pages 45–60. USENIX Associa-
tion.
Harchol, Y., Mushtaq, A., Fang, V., McCauley, J., Panda,
A., and Shenker, S. (2020). Making edge-computing
resilient. In Proceedings of the 11th ACM Symposium
on Cloud Computing, SoCC ’20, page 253–266, New
York, NY, USA. Association for Computing Machin-
ery.
Hay, R. (2017). fastboot oem vuln: Android bootloader
vulnerabilities in vendor customizations. In Enck, W.
and Mulliner, C., editors, 11th USENIX Workshop on
Offensive Technologies, WOOT 2017, Vancouver, BC,
Canada, August 14-15, 2017. USENIX Association.
Herwig, S., Harvey, K., Hughey, G., Roberts, R., and Levin,
D. (2019). Measurement and analysis of hajime, a
peer-to-peer iot botnet. In 26th Annual Network and
Distributed System Security Symposium, NDSS 2019,
San Diego, California, USA, February 24-27, 2019.
The Internet Society.
Huber, M., Hristozov, S., Ott, S., Sarafov, V., and Peinado,
M. (2020). The lazarus effect: Healing compromised
devices in the internet of small things. In Sun, H.,
Shieh, S., Gu, G., and Ateniese, G., editors, ASIA CCS
’20: The 15th ACM Asia Conference on Computer and
Communications Security, Taipei, Taiwan, October 5-
9, 2020, pages 6–19. ACM.
Kol, M. and Oberman, S. (2020). Ripple20. https:
//www.jsof-tech.com/wp-content/uploads/2020/06/
JSOF Ripple20 Technical Whitepaper June20.pdf.
Accessed 2022-03-01.
Kuang, B., Fu, A., Susilo, W., Yu, S., and Gao, Y. (2022). A
survey of remote attestation in internet of things: At-
tacks, countermeasures, and prospects. Comput. Se-
cur., 112:102498.
Liao, H.-J., Richard Lin, C.-H., Lin, Y.-C., and Tung, K.-Y.
(2013). Intrusion detection system: A comprehensive
review. Journal of Network and Computer Applica-
tions, 36(1):16–24.
Linaro Limited (2022). Open Portable Trusted Execu-
tion Environment. https://www.op-tee.org/. Accessed
2022-08-17.
M
¨
uller, T., Freiling, F. C., and Dewald, A. (2011). TRE-
SOR runs encryption securely outside RAM. In 20th
USENIX Security Symposium, San Francisco, CA,
USA, August 8-12, 2011, Proceedings. USENIX As-
sociation.
NXP Semiconductors (2022). Security Reference
Manual for i.MX 8M Dual/8M QuadLite/8M
Quad. https://www.nxp.com/webapp/Download?
colCode=IMX8MDQLQSRM\&appType=
moderatedWithoutFAE.
Pinto, S. and Santos, N. (2019). Demystifying arm trust-
zone: A comprehensive survey. ACM Comput. Surv.,
51(6):130:1–130:36.
Redini, N., Machiry, A., Das, D., Fratantonio, Y., Bianchi,
A., Gustafson, E., Shoshitaishvili, Y., Kruegel, C., and
Vigna, G. (2017). Bootstomp: On the security of boot-
loaders in mobile devices. In Kirda, E. and Risten-
part, T., editors, 26th USENIX Security Symposium,
USENIX Security 2017, Vancouver, BC, Canada, Au-
gust 16-18, 2017, pages 781–798. USENIX Associa-
tion.
R
¨
ockl, J., Protsenko, M., Huber, M., M
¨
uller, T., and Freil-
ing, F. C. (2021). Advanced system resiliency based
on virtualization techniques for iot devices. In ACSAC
’21: Annual Computer Security Applications Confer-
ence, Virtual Event, USA, December 6 - 10, 2021,
pages 455–467. ACM.
Selmke, B., Heyszl, J., and Sigl, G. (2016). Attack on a
DFA protected AES by simultaneous laser fault injec-
tions. In 2016 Workshop on Fault Diagnosis and Tol-
erance in Cryptography, FDTC 2016, Santa Barbara,
CA, USA, August 16, 2016, pages 36–46. IEEE Com-
puter Society.
Simmons, P. (2011). Security through amnesia: a software-
based solution to the cold boot attack on disk encryp-
tion. In Zakon, R. H., McDermott, J. P., and Lo-
casto, M. E., editors, Twenty-Seventh Annual Com-
puter Security Applications Conference, ACSAC 2011,
Orlando, FL, USA, 5-9 December 2011, pages 73–82.
ACM.
Suzaki, K., Tsukamoto, A., Green, A., and Mannan, M.
(2020). Reboot-oriented iot: Life cycle management
in trusted execution environment for disposable iot
devices. In ACSAC ’20: Annual Computer Security
Applications Conference, Virtual Event / Austin, TX,
USA, 7-11 December, 2020, pages 428–441. ACM.
Symantec (2016). Internet Security Threat Report.
https://docs.broadcom.com/doc/istr-16-april-volume-
21-en. Accessed 2020-05-11.
Syverson, P. F. (1994). A taxonomy of replay attacks. In
Seventh IEEE Computer Security Foundations Work-
shop - CSFW’94, Franconia, New Hampshire, USA,
June 14-16, 1994, Proceedings, pages 187–191. IEEE
Computer Society.
Tim Hummel (2017). FPGA eMMC Reader/Sniffer.
https://timhummel.com/portfolio/fpga
emmc reader
sniffer/. Accessed 2022-08-12.
Western Digital (2017). e.MMC Security Methods. https:
//documents.westerndigital.com/content/dam/doc-
library/en us/assets/public/western-digital/collateral/
white-paper/white-paper-emmc-security.pdf. Ac-
cessed 2022-08-12.
Xu, M., Huber, M., Sun, Z., England, P., Peinado, M., Lee,
S., Marochko, A., Mattoon, D., Spiger, R., and Thom,
S. (2019). Dominance as a new trusted computing
primitive for the internet of things. In 2019 IEEE Sym-
posium on Security and Privacy, SP 2019, San Fran-
cisco, CA, USA, May 19-23, 2019, pages 1415–1430.
IEEE.
Yu, W., Liang, F., He, X., Hatcher, W. G., Lu, C., Lin, J.,
and Yang, X. (2018). A survey on the edge computing
for the internet of things. IEEE Access, 6:6900–6919.
Zinzindohou
´
e, J. K., Bhargavan, K., Protzenko, J., and
Beurdouche, B. (2017). Hacl*: A verified modern
cryptographic library. In Thuraisingham, B., Evans,
D., Malkin, T., and Xu, D., editors, Proceedings
of the 2017 ACM SIGSAC Conference on Computer
and Communications Security, CCS 2017, Dallas, TX,
USA, October 30 - November 03, 2017, pages 1789–
1806. ACM.
Veto: Prohibit Outdated Edge System Software from Booting
57