ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2102.07014
  4. Cited By
GAROTA: Generalized Active Root-Of-Trust Architecture
v1v2 (latest)

GAROTA: Generalized Active Root-Of-Trust Architecture

13 February 2021
Esmerald Aliaj
Ivan De Oliveira Nunes
Gene Tsudik
ArXiv (abs)PDFHTML

Papers citing "GAROTA: Generalized Active Root-Of-Trust Architecture"

9 / 9 papers shown
Title
EILID: Execution Integrity for Low-end IoT Devices
EILID: Execution Integrity for Low-end IoT Devices
Sashidhar Jakkamsetti
Youngil Kim
Andrew Searles
Gene Tsudik
43
0
0
17 Jan 2025
TRACES: TEE-based Runtime Auditing for Commodity Embedded Systems
TRACES: TEE-based Runtime Auditing for Commodity Embedded Systems
Adam Caulfield
Antonio Joia Neto
Norrathep Rattanavipanon
Ivan De Oliveira Nunes
126
1
0
27 Sep 2024
SoK: Runtime Integrity
SoK: Runtime Integrity
Mahmoud Ammar
Adam Caulfield
Ivan De Oliveira Nunes
63
5
0
19 Aug 2024
Poster: Control-Flow Integrity in Low-end Embedded Devices
Sashidhar Jakkamsetti
Youngil Kim
Andrew Searles
Gene Tsudik
22
0
0
19 Sep 2023
Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence (Full
  Version)
Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence (Full Version)
Sashidhar Jakkamsetti
Youngil Kim
Gene Tsudik
64
6
0
07 Sep 2023
ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active
  Control Flow Attestation
ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation
Adam Caulfield
Norrathep Rattanavipanon
Ivan De Oliveira Nunes
60
14
0
28 Mar 2023
CASU: Compromise Avoidance via Secure Update for Low-end Embedded
  Systems
CASU: Compromise Avoidance via Secure Update for Low-end Embedded Systems
Ivan De Oliveira Nunes
Sashidhar Jakkamsetti
Youngil Kim
Gene Tsudik
44
7
0
02 Sep 2022
Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with
  VERSA
Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA
Ivan De Oliveira Nunes
Seoyeon Hwang
Sashidhar Jakkamsetti
Gene Tsudik
53
8
0
05 May 2022
A Comprehensive Survey on the State-of-the-art Data Provenance
  Approaches for Security Enforcement
A Comprehensive Survey on the State-of-the-art Data Provenance Approaches for Security Enforcement
Md Morshed Alam
Weichao Wang
31
11
0
04 Jul 2021
1