TY - GEN
T1 - Proving IoT Devices Firmware Integrity with Bijective MAC Time Stamped
AU - Urien, Pascal
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/6/1
Y1 - 2020/6/1
N2 - This demonstration presents an innovative bijective MAC Time Stamped algorithm (bMAC_TS), running in an Arduino Nano, whose code is open and published. The goal of bMAC_TS is to detect corrupted software (especially bootloader) in IoT devices. It relies on two pillars: the memory space is finite and the computing time is stable. This algorithm computes a memory fingerprint with a hash function, according to a pseudo random order, fixed by a permutation P. The time required by this operation, following a normal distribution, is exored with the fingerprint.
AB - This demonstration presents an innovative bijective MAC Time Stamped algorithm (bMAC_TS), running in an Arduino Nano, whose code is open and published. The goal of bMAC_TS is to detect corrupted software (especially bootloader) in IoT devices. It relies on two pillars: the memory space is finite and the computing time is stable. This algorithm computes a memory fingerprint with a hash function, according to a pseudo random order, fixed by a permutation P. The time required by this operation, following a normal distribution, is exored with the fingerprint.
KW - IoT
KW - Security
KW - Software Integrity
U2 - 10.1109/WF-IoT48130.2020.9221395
DO - 10.1109/WF-IoT48130.2020.9221395
M3 - Conference contribution
AN - SCOPUS:85095564270
T3 - IEEE World Forum on Internet of Things, WF-IoT 2020 - Symposium Proceedings
BT - IEEE World Forum on Internet of Things, WF-IoT 2020 - Symposium Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 6th IEEE World Forum on Internet of Things, WF-IoT 2020
Y2 - 2 June 2020 through 16 June 2020
ER -