Katholieke Universiteit Leuven
Embedded devices are increasingly becoming interconnected, sometimes over the public Internet. This poses a major security concern, as these devices handle sensitive information (e.g., banking credentials and personal data) or they are critical for the safety of human lives (e.g., smoke detector and airbag system). Security protocols need to be used in combination with a trusted computing base to ensure that attackers cannot alter the state of the software running on these devices to leak secrets. In this paper the authors focus on the problem of secure interrupt handling, which has not been covered in related work.