Please use this identifier to cite or link to this item: https://rfos.fon.bg.ac.rs/handle/123456789/2910
Full metadata record
DC FieldValueLanguage
dc.creatorMiljanić, Maja-
dc.creatorSretenović Bogićević, Marija-
dc.creatorJovanović, Bojan-
dc.date.accessioned2024-12-20T11:26:29Z-
dc.date.available2024-12-20T11:26:29Z-
dc.date.issued2024-06-
dc.identifier.isbn978-86-7680-464-1-
dc.identifier.urihttps://rfos.fon.bg.ac.rs/handle/123456789/2910-
dc.description.abstractCommon attacks used to exploit vulnerabilities of IoT devices with the goal of exposing cryptographic secrets (keys, signatures, certificates) or bypassing verifications that use these secrets, include fault injection, side channel attacks and firmware extraction. Exposing cryptographic secrets in IoT can cause various problems from data breaches to malicious firmware flashing, leading to violation of data privacy and even substantial damage. The goal of this paper is to review methods for securing cryptographic secrets in IoT with some examples of microcontrollers and processors frequently used in IoT devices.sr
dc.publisherUniversity of Belgrade - Faculty of Organizational Sciences, Jove Ilića 154, Belgradesr
dc.rightsopenAccesssr
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/
dc.sourceINTERNATIONAL symposium SymOrg 2024sr
dc.subjectIoTsr
dc.subjectsecuritysr
dc.subjectcryptographysr
dc.titleSECURING CRYPTOGRAPHIC SECRETS ON IOT DEVICES: A REVIEWsr
dc.typearticlesr
dc.rights.licenseBYsr
dc.citation.epage103-
dc.citation.spage98-
dc.type.versionpublishedVersionsr
item.cerifentitytypePublications-
item.fulltextNo Fulltext-
item.grantfulltextnone-
item.openairetypearticle-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
Appears in Collections:Radovi istraživača / Researchers’ publications
Show simple item record

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons