MTD, where art thou? A systematic review of moving target defense techniques for IoT
Context: Internet-of-Things (IoT) systems are increasingly deployed in the real world, but
their security lags behind the state of the art of non-IoT systems. Moving target defense …
their security lags behind the state of the art of non-IoT systems. Moving target defense …
[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …
protecting computers from harmful malware. The goal of these techniques is not removing …
Understanding software obfuscation and diversification as defensive measures for the cybersecurity of Internet of Things
Abstract Internet of Things (IoT) has emerged as an umbrella term to describe connecting
smart everyday objects (such as washing machines, toilets and sound systems), sensors …
smart everyday objects (such as washing machines, toilets and sound systems), sensors …
[PDF][PDF] Mitigating cyberattacks affecting resource-constrained devices through moving target defense (mtd) mechanisms
J Cedeno - by Alberto Huertas Celdran, Jan von der Assen, and …, 2022 - files.ifi.uzh.ch
Abstract Most Internet of Things (IoT) devices such as radio spectrum sensors are not
designed and built with security in mind. The static nature of such IoT devices coupled with …
designed and built with security in mind. The static nature of such IoT devices coupled with …
IoT security: a survey of issues, attacks and defences
V Kumar Jain, J Gajrani - … Learning for Computer Vision: Proceedings of …, 2021 - Springer
Internet of things (IoT) is the disruptive technology used in the computer automaton.
Embedded electronic hardware is connected to Internet in IoT. Connecting IoT devices to the …
Embedded electronic hardware is connected to Internet in IoT. Connecting IoT devices to the …
Internal interface diversification as a security measure in sensor networks
More actuator and sensor devices are connected to the Internet of Things (IoT) every day,
and the network keeps growing, while software security of the devices is often incomplete …
and the network keeps growing, while software security of the devices is often incomplete …
Enhancing resilience in IoT cybersecurity: the roles of obfuscation and diversification techniques for improving the multilayered cybersecurity of IoT systems
In our digitalized modern society where cyber-physical systems and internet-of-things (IoT)
devices are increasingly commonplace, it is paramount that we are able to assure the …
devices are increasingly commonplace, it is paramount that we are able to assure the …
Improving the resilience of the constrained Internet of Things: a moving target defense approach
RE Navas - 2020 - theses.hal.science
Internet of Things (IoT) systems are increasingly being deployed in the real world, but their
security lags behind the state of the art of non-IoT systems. Moving Target Defense (MTD) is …
security lags behind the state of the art of non-IoT systems. Moving Target Defense (MTD) is …
Moving Target Defense Techniques for the IoT
This chapter addresses cyberdefense techniques for the Internet of Things (IoT) based on
the Moving Target Defense (MTD) paradigm. It presents general concepts from classical …
the Moving Target Defense (MTD) paradigm. It presents general concepts from classical …
Adapting Access Control for IoT Security
The Internet of Things (IoT) is a new paradigm making it possible to improve human quality
of life while still ensuring that advanced intelligent services are used in our daily lives by …
of life while still ensuring that advanced intelligent services are used in our daily lives by …