2016
DOI: 10.1145/3015662
|View full text |Cite
|
Sign up to set email alerts
|

Embedded Device Forensics and Security

Abstract: While the increasing digitalization of our society and amalgamation of embedded devices into the everincreasing facets of our daily life (e.g., in smart and intelligent vehicles, smart cities and smart nations, and critical infrastructure sectors) have resulted in improved productivity and quality of life, the trend has also resulted in a trend of increasing frequency and sophistication of cyber exploitation and cyber threats. Hence, there is a need for coordinated efforts from the research community to addres… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…This, perhaps, explains the increasingly popularity of cloud computing due to the capability to support sustainable computing based on a pay-as-you-use business model [4]. Hence, we have witnessed a recent trend in processing cyber-physical-social big data in the cloud, despite the underlying cloud security issues, for example potential leakage of user's network data (particularly in the aftermath of the revelations by Edward Snowden), risks of malicious insider attacks, and inference threats [5,6]. Thus, addressing such concerns is key to widespread cloud adoption in CPSS [7].…”
Section: Introductionmentioning
confidence: 99%
“…This, perhaps, explains the increasingly popularity of cloud computing due to the capability to support sustainable computing based on a pay-as-you-use business model [4]. Hence, we have witnessed a recent trend in processing cyber-physical-social big data in the cloud, despite the underlying cloud security issues, for example potential leakage of user's network data (particularly in the aftermath of the revelations by Edward Snowden), risks of malicious insider attacks, and inference threats [5,6]. Thus, addressing such concerns is key to widespread cloud adoption in CPSS [7].…”
Section: Introductionmentioning
confidence: 99%
“…smart cities and smart homes) and military application (e.g. Internet of Battlefield Things and Internet of Military Things) [1,2,3,4]. Similar to other popular information and communications technologies, security and privacy issues are two key considerations and these are active and ongoing research areas.…”
Section: Introductionmentioning
confidence: 99%