2020
DOI: 10.1145/3376123
|View full text |Cite
|
Sign up to set email alerts
|

Attack and System Modeling Applied to IoT, Cloud, and Mobile Ecosystems

Abstract: Over the years, pervasive computing and communication technologies have enabled the emergence of new computing paradigms that have gained importance across a wide spectrum of domains. The three most notable that have witnessed significant advancements and have a solid track record of exponential growth in diverse applications are the Internet of Things (IoT), Cloud, and Mobile Computing. The ubiquity of these paradigms, their expandability, and applicability in different problem spaces have made them invaluabl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(10 citation statements)
references
References 66 publications
0
9
0
Order By: Relevance
“…In addition, wearables connected to the Internet could be hacked and used to attack other systems. This creates the issue of developing wearables with a security-by-design paradigm [232,233] to identify security risks and vulnerabilities during the design and development phases of a system rather than mitigating them after cyberattacks. The Mirai botnet illustrates this issue.…”
Section: Securitymentioning
confidence: 99%
“…In addition, wearables connected to the Internet could be hacked and used to attack other systems. This creates the issue of developing wearables with a security-by-design paradigm [232,233] to identify security risks and vulnerabilities during the design and development phases of a system rather than mitigating them after cyberattacks. The Mirai botnet illustrates this issue.…”
Section: Securitymentioning
confidence: 99%
“…The authors first analyze the state-of-the-art of techniques for different cloud components and subsequently discuss current limitations and challenges. Further, Sequeiros et al survey existing attack and system modeling techniques that are applicable to IoT and cloud computing [120].…”
Section: Related Workmentioning
confidence: 99%
“…Threat mitigation is a process of reducing all the possible threats in a system. In order to propose the mitigation techniques for the identified threats, we analyzed some existing threat mitigation studies [25], [26], [27], [28], [29]. After performing the analysis on these studies, we adopt the best possible remedies in order to protect the smart home use case from the potential threats.…”
Section: F Threats Mitigationmentioning
confidence: 99%