Näytä suppeat kuvailutiedot

dc.contributor.authorCostin, Andrei
dc.contributor.editorBalandin, Sergey
dc.contributor.editorHämäläinen, Timo
dc.contributor.editorTyutina, Tatiana
dc.date.accessioned2019-06-20T11:45:37Z
dc.date.available2019-06-20T11:45:37Z
dc.date.issued2018
dc.identifier.citationCostin, A. (2018). IoT/Embedded vs. Security : Learn from the Past, Apply to the Present, Prepare for the Future. In S. Balandin, T. Hämäläinen, & T. Tyutina (Eds.), <i>FRUCT : Proceedings of the 22nd Conference of Open Innovations Association</i> (pp. 412-414). FRUCT Oy. Proceedings of Conference of Open Innovations Association FRUCT. <a href="https://fruct.org/publications/acm22/files/Cos.pdf" target="_blank">https://fruct.org/publications/acm22/files/Cos.pdf</a>
dc.identifier.otherCONVID_31231180
dc.identifier.otherTUTKAID_81759
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/64778
dc.description.abstractIt is expected there will be 50 billion IoT/embedded connected devices by 2020. At the same time, multiple recent studies revealed that IoT/embedded devices and their software/firmware is plagued with weaknesses and vulnerabilities. Moreover, various recent and prominent attacks, such as the Mirai botnet targeting Commercial Off-The-Shelf (COTS) IoT/embedded devices, and the ROCA attack targeting secure embedded hardware chips (in their many form-factors), clearly demonstrate the need to secure the many layers and components of the highly fragmented and heterogeneous ecosystem of IoT/embedded devices. In this paper we aim to explore, discuss and exemplify some research aspects and directions that could be used to help improve the long-term security posture for IoT/embedded devices.fi
dc.format.extent426
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherFRUCT Oy
dc.relation.ispartofFRUCT : Proceedings of the 22nd Conference of Open Innovations Association
dc.relation.ispartofseriesProceedings of Conference of Open Innovations Association FRUCT
dc.relation.urihttps://fruct.org/publications/acm22/files/Cos.pdf
dc.rightsCC BY-ND 4.0
dc.subject.othersecurity
dc.titleIoT/Embedded vs. Security : Learn from the Past, Apply to the Present, Prepare for the Future
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-201906203353
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.date.updated2019-06-20T09:15:12Z
dc.relation.isbn978-952-68653-4-8
dc.description.reviewstatusnonPeerReviewed
dc.format.pagerange412-414
dc.relation.issn2305-7254
dc.type.versionpublishedVersion
dc.rights.copyright© 2018, IEEE.
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceConference of Open Innovations Association
dc.subject.ysoesineiden internet
dc.subject.ysosulautettu tietotekniikka
dc.subject.ysotietoturva
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p27206
jyx.subject.urihttp://www.yso.fi/onto/yso/p5461
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
dc.rights.urlhttps://creativecommons.org/licenses/by-nd/4.0/


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

CC BY-ND 4.0
Ellei muuten mainita, aineiston lisenssi on CC BY-ND 4.0