Stuck in Tutorial Hell? Learn Backend Dev the Right Way
Most AI Pilots Fail to Scale. MIT Sloan Teaches You Why — and How to Fix It
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a groundbreaking approach to IoT security in this IEEE conference talk. Delve into the concept of dominance as a new trusted computing primitive for the Internet of Things. Learn about Cider, an innovative system designed to rapidly recover compromised IoT devices in large-scale deployments. Discover how this solution addresses the unique challenges of IoT security, including cost constraints and minimal human interaction requirements. Examine the implementation of Cider across three popular IoT platforms, ranging from high to low-end devices. Gain insights into the system's performance and its potential to revolutionize recovery processes for compromised IoT networks. Understand the implications of this research for the future of IoT security and trusted computing in an increasingly connected world.
Syllabus
Dominance as a New Trusted Computing Primitive for the IoT
Taught by
IEEE Symposium on Security and Privacy