IoT security configurability with security-by-contract

A Giaretta, N Dragoni, F Massacci - Sensors, 2019 - mdpi.com
Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well
as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still …

S× C4IoT: a security-by-contract framework for dynamic evolving IoT devices

A Giaretta, N Dragoni, F Massacci - ACM Transactions on Sensor …, 2021 - dl.acm.org
The Internet of Things (IoT) revolutionised the way devices, and human beings, cooperate
and interact. The interconnectivity and mobility brought by IoT devices led to extremely …

Protecting the internet of things with security-by-contract and fog computing

A Giaretta, N Dragoni… - 2019 IEEE 5th World …, 2019 - ieeexplore.ieee.org
Nowadays, the Internet of Things (IoT) is a consolidated reality. Smart homes are equipped
with a growing number of IoT devices that capture more and more information about human …

On-board credentials: an open credential platform for mobile devices

K Kostiainen - 2012 - aaltodoc.aalto.fi
Traditional credential solutions have well-known drawbacks. Purely software-based
credentials are vulnerable to many attacks, while hardware-based security tokens and smart …

[PDF][PDF] Risk-driven security testing versus test-driven security risk analysis

G Erdogan - First Doctoral Symposium on Engineering Secure …, 2012 - Citeseer
It is important to clearly distinguish the combinations of security testing and security risk
analysis depending on whether it is viewed from a security testing perspective or a security …

[PDF][PDF] Security of the OSGi platform

A Philippov, O Gadyatskaya, F Massacci - Proceedings of the …, 2012 - ceur-ws.org
In the last few years we have seen how increasing computational power of electronic
devices triggers the functionality growth of the software that runs on them. The natural …

[PDF][PDF] 2011 IEEE International Symposium on Policies for Distributed Systems and Networks

N Dragoni, E Lostal, D Papini - academia.edu
The Security-by-Contract (S× C) framework has recently been proposed to support software
evolution in open multi-application smart cards. The key idea lies in the notion of contract, a …

Increasing the security of smart cards against power analysis attacks

SM Dadgar, MR Salehnamadi, SF Adib - Advances in Environmental …, 2014 - go.gale.com
One of the most important aspect of smart cards is the security of smart cards. In this paper
we will investigate the security of smart cards and its formal attacks firstly. One type of attacks …

A process for system development

P Hruschka - Proceedings 1994 Tutorial and Workshop on …, 1994 - ieeexplore.ieee.org
Since the mid-1970s, several successful methods have been created for develo**
embedded computer systems. Most of them concentrate on techniques and tools for …

²: A system to secure off-card contract-policy matching in security-by-contract for open multi-application smart cards

N Dragoni, E Lostal, D Papini - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
The Security-by-Contract (SxC) framework has recently been proposed to support software
evolution in open multi-application smart cards. The key idea lies in the notion of contract, a …