IoT security configurability with security-by-contract
Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well
as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still …
as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still …
S× C4IoT: a security-by-contract framework for dynamic evolving IoT devices
The Internet of Things (IoT) revolutionised the way devices, and human beings, cooperate
and interact. The interconnectivity and mobility brought by IoT devices led to extremely …
and interact. The interconnectivity and mobility brought by IoT devices led to extremely …
Protecting the internet of things with security-by-contract and fog computing
Nowadays, the Internet of Things (IoT) is a consolidated reality. Smart homes are equipped
with a growing number of IoT devices that capture more and more information about human …
with a growing number of IoT devices that capture more and more information about human …
On-board credentials: an open credential platform for mobile devices
K Kostiainen - 2012 - aaltodoc.aalto.fi
Traditional credential solutions have well-known drawbacks. Purely software-based
credentials are vulnerable to many attacks, while hardware-based security tokens and smart …
credentials are vulnerable to many attacks, while hardware-based security tokens and smart …
[PDF][PDF] Risk-driven security testing versus test-driven security risk analysis
G Erdogan - First Doctoral Symposium on Engineering Secure …, 2012 - Citeseer
It is important to clearly distinguish the combinations of security testing and security risk
analysis depending on whether it is viewed from a security testing perspective or a security …
analysis depending on whether it is viewed from a security testing perspective or a security …
[PDF][PDF] Security of the OSGi platform
In the last few years we have seen how increasing computational power of electronic
devices triggers the functionality growth of the software that runs on them. The natural …
devices triggers the functionality growth of the software that runs on them. The natural …
[PDF][PDF] 2011 IEEE International Symposium on Policies for Distributed Systems and Networks
The Security-by-Contract (S× C) framework has recently been proposed to support software
evolution in open multi-application smart cards. The key idea lies in the notion of contract, a …
evolution in open multi-application smart cards. The key idea lies in the notion of contract, a …
Increasing the security of smart cards against power analysis attacks
One of the most important aspect of smart cards is the security of smart cards. In this paper
we will investigate the security of smart cards and its formal attacks firstly. One type of attacks …
we will investigate the security of smart cards and its formal attacks firstly. One type of attacks …
A process for system development
P Hruschka - Proceedings 1994 Tutorial and Workshop on …, 1994 - ieeexplore.ieee.org
Since the mid-1970s, several successful methods have been created for develo**
embedded computer systems. Most of them concentrate on techniques and tools for …
embedded computer systems. Most of them concentrate on techniques and tools for …
²: A system to secure off-card contract-policy matching in security-by-contract for open multi-application smart cards
The Security-by-Contract (SxC) framework has recently been proposed to support software
evolution in open multi-application smart cards. The key idea lies in the notion of contract, a …
evolution in open multi-application smart cards. The key idea lies in the notion of contract, a …