Proceedings of the 9th International Conference on Utility and Cloud Computing 2016
DOI: 10.1145/2996890.3007877
|View full text |Cite
|
Sign up to set email alerts
|

Interface diversification in IoT operating systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…Gao et al (2017) proposed an accuracy indoor RFID localization algorithm named NMDS-RFID (F) to realize a RFID multi-tag cooperative localization method in the indoor environment. Maki et al (2016) introduced diversification on the interfaces of IoT operating systems and library symbol diversification method, and explored a security approach for IoT operating systems based on memory layout shuffling and symbol diversification. Mushunuri et al (2017) proposed optimizing libraries within the Robot Operating System by deploying robotic sensor-actuators in simulation environment for runtime optimization, which could open up a wide range of use-cases in mobile IoT deployments.…”
Section: Iot Applications In Librariesmentioning
confidence: 99%
“…Gao et al (2017) proposed an accuracy indoor RFID localization algorithm named NMDS-RFID (F) to realize a RFID multi-tag cooperative localization method in the indoor environment. Maki et al (2016) introduced diversification on the interfaces of IoT operating systems and library symbol diversification method, and explored a security approach for IoT operating systems based on memory layout shuffling and symbol diversification. Mushunuri et al (2017) proposed optimizing libraries within the Robot Operating System by deploying robotic sensor-actuators in simulation environment for runtime optimization, which could open up a wide range of use-cases in mobile IoT deployments.…”
Section: Iot Applications In Librariesmentioning
confidence: 99%
“…Jansrithep and Siriborvornratanakul (2016) propose a prototype system that collaborates smartwatches with traditional video surveillance security. Mäki et al (2016) apply diversification in post-compilation and linking phase of the software life cycle to prevent malicious exploits from producing adverse effects in IoT. Shila et al (2016) propose Intrusion Checkers within the embedded firmware by employing source code instrumentation techniques for resisting malicious firmware attacks.…”
Section: Challengesmentioning
confidence: 99%
“…After this, there has been a large body of research concerning interface diversification (Hosseinzadeh et al, 2018), and in recent years, the idea has also been increasingly been applied to software running on IoT devices (Hosseinzadeh et al, 2016;Koivunen et al, 2016;Mäki et al, 2016).…”
Section: Obfuscation and Diversification Tomentioning
confidence: 99%