Please use this identifier to cite or link to this item:
https://rfos.fon.bg.ac.rs/handle/123456789/2910Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.creator | Miljanić, Maja | - |
| dc.creator | Sretenović Bogićević, Marija | - |
| dc.creator | Jovanović, Bojan | - |
| dc.date.accessioned | 2024-12-20T11:26:29Z | - |
| dc.date.available | 2024-12-20T11:26:29Z | - |
| dc.date.issued | 2024-06 | - |
| dc.identifier.isbn | 978-86-7680-464-1 | - |
| dc.identifier.uri | https://rfos.fon.bg.ac.rs/handle/123456789/2910 | - |
| dc.description.abstract | Common attacks used to exploit vulnerabilities of IoT devices with the goal of exposing cryptographic secrets (keys, signatures, certificates) or bypassing verifications that use these secrets, include fault injection, side channel attacks and firmware extraction. Exposing cryptographic secrets in IoT can cause various problems from data breaches to malicious firmware flashing, leading to violation of data privacy and even substantial damage. The goal of this paper is to review methods for securing cryptographic secrets in IoT with some examples of microcontrollers and processors frequently used in IoT devices. | sr |
| dc.publisher | University of Belgrade - Faculty of Organizational Sciences, Jove Ilića 154, Belgrade | sr |
| dc.rights | openAccess | sr |
| dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | |
| dc.source | INTERNATIONAL symposium SymOrg 2024 | sr |
| dc.subject | IoT | sr |
| dc.subject | security | sr |
| dc.subject | cryptography | sr |
| dc.title | SECURING CRYPTOGRAPHIC SECRETS ON IOT DEVICES: A REVIEW | sr |
| dc.type | article | sr |
| dc.rights.license | BY | sr |
| dc.citation.epage | 103 | - |
| dc.citation.spage | 98 | - |
| dc.type.version | publishedVersion | sr |
| item.cerifentitytype | Publications | - |
| item.fulltext | No Fulltext | - |
| item.grantfulltext | none | - |
| item.openairetype | article | - |
| item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
| Appears in Collections: | Radovi istraživača / Researchers’ publications | |
This item is licensed under a Creative Commons License