2017 IEEE Security and Privacy Workshops (SPW) 2017
DOI: 10.1109/spw.2017.36
|View full text |Cite
|
Sign up to set email alerts
|

Building Hardened Internet-of-Things Clients with Language-Theoretic Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 14 publications
0
11
0
Order By: Relevance
“…Fourth, the adapted tests are executed manually or automatically on an execution environment. In the case of IoT, it could be represented by FIT-IoT, 15 where large-scale deployments can be simulated. Finally, test results are collected to detect flaws and non-satisfactory test verdicts.…”
Section: Model-based Testing (Mbt)mentioning
confidence: 99%
See 1 more Smart Citation
“…Fourth, the adapted tests are executed manually or automatically on an execution environment. In the case of IoT, it could be represented by FIT-IoT, 15 where large-scale deployments can be simulated. Finally, test results are collected to detect flaws and non-satisfactory test verdicts.…”
Section: Model-based Testing (Mbt)mentioning
confidence: 99%
“…Moreover, fuzzing testing has also attracted the interest in the IoT ecosystem. In particular, Reference [15] is focused on IoT application-layer protocols by building a set of possible inputs in each state of the protocol state machine. Towards a more general application, Reference [48] designs a fuzzing framework for discovering memory corruption vulnerabilities in IoT devices.…”
Section: Security Testing: Analysis and Applicability To The Iot Contextmentioning
confidence: 99%
“…One of the most popular approaches is represented by penetration testing, in which real-world attacks are simulated to identify vulnerabilities [24]- [26]. Another related approach is fuzzing testing, which is based on using non-valid inputs to stress the SUT [27]- [30]. Fuzzing testing can be classified on data fuzzing testing [31], in which random data are used as an input to test the SUT, and behavioural fuzzing testing [32] that produces sequences of invalid messages.…”
Section: A Security Testing In Iotmentioning
confidence: 99%
“…This way, the CVSS vector, impact-metric, is codified as specified in the CVSS standard (lines 20 and 26). It is possible to add additional information from the different tests, such as the maximum number of simultaneous connections that the server supports (element Value) (lines [27][28][29][30][31][32]. At the end of the TestResult element, it is mandatory the element Score, indicating the total score achieved in the security assessment process.…”
Section: A Assessment Report Generation Based On Xccdfmentioning
confidence: 99%
“…Snapins also enable the layering of security proactively at a global control point in a piece of unmodified software [23]. For example, secure input-handling parsing of command inputs to Internet of Things devices via the application of language-theoretic security [1] can avert potential security holes by creating parser-combinators that enforce input validation to prevent malicious data manipulation.…”
Section: Introductionmentioning
confidence: 99%