Vai al contenuto principale della pagina

Attacks and defenses for the internet-of-things : 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, revised selected papers / / edited by WenJuan Li, Steven Furnell, Weizhi Meng



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Attacks and defenses for the internet-of-things : 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, revised selected papers / / edited by WenJuan Li, Steven Furnell, Weizhi Meng Visualizza cluster
Pubblicazione: Cham, Switzerland : , : Springer, , [2022]
©2022
Descrizione fisica: 1 online resource (187 pages)
Disciplina: 929.605
Soggetto topico: Computers
Persona (resp. second.): LiWenjuan
FurnellSteven
MengWeizhi
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Intro -- Preface -- Organization -- Contents -- The Final Round: Benchmarking NIST LWC Ciphers on Microcontrollers -- 1 Introduction -- 2 Framework -- 2.1 Tested Metrics -- 2.2 Test Platforms -- 3 Evaluated Ciphers -- 4 Results -- 5 Conclusion -- References -- Evolving a Boolean Masked Adder Using Neuroevolution -- 1 Introduction -- 1.1 Contributions -- 1.2 Paper Organization -- 2 Efficient Side-Channel Protection -- 2.1 Conventional Masking of Addition -- 2.2 Optimizing Masked Addition Using Neuroevolution -- 3 Results -- 4 Application to Software Encryption -- 4.1 Shared Bitsliced Adder Assembly Implementation -- 4.2 Benchmark Results -- 5 Leakage Evaluation -- 6 Conclusion -- A ARM Assembly Implementation of the Shared Bitsliced 32-bit Adder -- References -- Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract) -- 1 Introduction -- 2 Background and Related Work -- 2.1 Explainable AI (XAI) -- 2.2 Unsupervised Model Explanations -- 2.3 Explaining Anomalies -- 3 Methodology -- 4 Experimental Evaluation -- 4.1 Dataset -- 4.2 Experimental Setting -- 4.3 Results and Discussion -- 5 Conclusion -- References -- Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality -- 1 Introduction -- 2 Preliminaries -- 2.1 Notations -- 2.2 Aggregate Signatures -- 2.3 Aggregate Signatures with Interactive Tracing Functionality -- 3 Feedback Waiting Time in ASIT -- 3.1 Existing Instantiations of DTT and ASIT -- 3.2 Evaluation of the Feedback Waiting Time of AS-FT-2 -- 4 An ASIT Scheme Without Feedback -- 4.1 Sequential Traitor Tracing -- 4.2 The Construction of an ASIT Scheme Without a Feedback -- 5 Comparison of AS-SW-1 with AS-FT-2 -- 5.1 Theoretical Evaluations -- 5.2 Implementation Evaluations -- 6 Conclusion -- References.
Post-quantum Secure Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unclonable Functions (Extended Abstract) -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Kyber Authenticated Key Exchange -- 3.2 Security Increase with SRAM BPUFs -- 4 Proposed Authentication Protocol -- 4.1 Assumptions -- 4.2 Enrollment Phase -- 4.3 Authentication Phase -- 5 Discussion and Experimental Results -- 6 Conclusions -- References -- Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes: Comparative Study -- 1 Introduction -- 2 Survey of Change Point Detection Algorithms -- 2.1 Problem Statement -- 2.2 Cost Functions -- 2.3 Search Methods -- 2.4 Evaluation -- 3 Experimental Results and Discussions -- 3.1 Enviroment Setup -- 3.2 Results and Discussions -- 4 Conclusions and Future Work -- References -- Consumer-Friendly Methods for Privacy Protection Against Cleaning Robots -- 1 Introduction -- 2 Definitions and Research Models -- 2.1 Definitions -- 2.2 Research Devices -- 2.3 Network Topology -- 2.4 Threat Model -- 3 Methodologies -- 3.1 Traffic Redirection -- 3.2 Traffic Analysis -- 3.3 App Analysis -- 4 Privacy Protection Methods: Procedural Description -- 4.1 Isolation Methods -- 4.2 Restriction Methods -- 4.3 Home Security Device -- 5 Privacy Protection Methods: Evaluation -- 5.1 Evaluation Framework -- 5.2 Isolation Methods -- 5.3 Restriction Methods -- 5.4 Home Security Device -- 6 Conclusion -- 6.1 Comparison Table -- 6.2 Limitations -- 6.3 Current State of Privacy Protection -- References -- Resource Efficient Federated Deep Learning for IoT Security Monitoring -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Baseline Federated Deep Learning (BFDL) -- 3.2 Resource Efficient Federated Deep Learning (REFDL) -- 4 Evaluation -- 4.1 Utilized Datasets.
4.2 Virtual Workers Experimental Setup and Implementation -- 4.3 Testbed Experimental Setup and Implementation -- 5 Results and Discussion -- 5.1 Virtual Workers Simulation Results -- 5.2 Network Workers Testbed Results -- 6 Conclusion -- References -- Man-in-the-OBD: A Modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security -- 1 Introduction -- 1.1 Goals and Contributions -- 1.2 Outline -- 2 Related Work -- 2.1 General Vehicular Security Concepts Describe the Threat of Unwanted Information Flow -- 2.2 Filtering of Inbound Traffic Towards the Car's ECUs Exists -- 2.3 Commercial Available Approaches Towards Filtering and Securing the OBD-II Interface -- 3 Threat Modelling for OBD-II -- 3.1 Threats Following STRIDE -- 3.2 Results of OBD-II Threat Modeling -- 4 Architecture of the Man-in-the-OBD -- 4.1 Producer/Consumer Scheme -- 4.2 Modular Approach for Protocol Bindings -- 4.3 CAN-Bus Binding -- 4.4 Processing Pipeline -- 4.5 Serialization -- 4.6 Data Storage -- 4.7 Policy Management -- 4.8 Rule Enforcement -- 5 Implementation -- 5.1 Producer/Consumer Solution -- 5.2 Storing of CAN-Messages -- 5.3 Pipeline Benchmarks -- 6 Evaluation of Impact on Threats and Existing Dongles -- 6.1 Testing the RYD-Box -- 6.2 Testing the VW Data Plug -- 6.3 Evaluation of Existing Dongles -- 6.4 Evaluation of Threat Mitigation -- 7 Conclusion -- 7.1 Future Work -- References -- Mapping the Security Events to the MITRE ATT& -- CK Attack Patterns to Forecast Attack Propagation (Extended Abstract) -- 1 Introduction -- 2 Related Research -- 3 Technique for Mapping the Security Events to the Attack Patterns -- 4 Implementation and Experiments -- 5 Discussion and Conclusion -- References -- Author Index.
Titolo autorizzato: Attacks and defenses for the internet-of-things  Visualizza cluster
ISBN: 3-031-21311-4
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 996503470703316
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Computer Science Ser.