Description
brainstorm Not afraid of assembly! Defend: July 2025. Phd ambition!!!
GPA could use some boosting.
First, describe the scope and past occurrences of node hijacks.
From Solarwinds to the recent 1.3 million Android TVs in a botnet. Do you aim to protect from unzip fail of firmware update?
Security frameworks. sandbox where you can run anything. IoT device, build Raspberry pi with TinyML as exemplary use-case?
ToDo
Other ideas:
- byzantine faults; Engraft: Enclave-guarded Raft on Byzantine Faulty Nodes
- DNA passport
- Low-level PUF
- Open HSM
- IoT devices, etc.
https://www.enisa.europa.eu/publications/eidas-compliant-eid-solutions/@@download/fullReport
Zero-Trust Architecture for Legal Entities
update: Cars now have firmware and secure boot. In-line with your 'hacking' passion. Toyota cars get stolen using CANbus attack. There is a Tesla bug hunting bounty. Smartphone app opens your car, passport-grade authentication. Link to insurance and question who was driving the car when damage occurred?? 🤔 (more US thing versus EU where things are decently organised). The science: protecting high-value 'portable' computers and firmware {zero-trust}.
update2: V2X tech for "car wifi" in 5.9 GHz band. Police remotely stopping a car is no longer the realm of Sci-Fi movies. See the trail of a "remote car stopping" from the Czech Technical University in Prague and the BUT in Brno and PR stuff from the USA.
- Towards zero trust security in connected vehicles: A comprehensive survey
- A Zero Trust Architecture for Connected and Autonomous Vehicles
- A curated list of awesome resources, books, hardware, software, applications, people to follow, and more cool stuff about vehicle security, car hacking, and tinkering with the functionality of your car.
- HOW TO BEGIN V2X DEVELOPMENT ON LINUX
ToDo: a draft 1-page research proposal (e.g. the science focus side)