Ertem Esiner
YOU?
Author Swipe
View article: On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers
On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers Open
Programmable logic controllers (PLCs) are crucial devices for implementing automated control in various industrial control systems (ICS), such as smart power grids, water treatment systems, manufacturing, and transportation systems. Owing …
View article: Message Authentication and Provenance Verification for Industrial Control Systems
Message Authentication and Provenance Verification for Industrial Control Systems Open
Successful attacks against industrial control systems (ICSs) often exploit insufficient checking mechanisms. While firewalls, intrusion detection systems, and similar appliances introduce essential checks, their efficacy depends on the att…
View article: Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems
Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems Open
Attacks against industrial control systems (ICSs) often exploit the\ninsufficiency of authentication mechanisms. Verifying whether the received\nmessages are intact and issued by legitimate sources can prevent malicious\ndata/command injec…
View article: LoMoS: Less-Online/More-Offline Signatures for Extremely Time-Critical Systems
LoMoS: Less-Online/More-Offline Signatures for Extremely Time-Critical Systems Open
The state-of-the-art digital signatures incur undesirable delays, hence are impractical for time-stringent Industrial Control Systems (ICSs). The recent revision to IEC 62351–6 standard stepped back from digital signatures in favor of symm…
View article: Two-factor authentication for trusted third party free dispersed storage
Two-factor authentication for trusted third party free dispersed storage Open
We propose a trusted third party free protocol for secure (in terms of content access, manipulation, and confidentiality) data storage and multi-user collaboration over an infrastructure of untrusted storage servers. It is achieved by the …
View article: Layered security for storage at the edge
Layered security for storage at the edge Open
In this paper we propose a protocol that allows end-users in a decentralized setup (without requiring any trusted third party) to protect data shipped to remote servers using two factors - knowledge (passwords) and possession (a time based…