Internet of Things (IoT) device software has to be resistant to faults to ensure data privacy and security. In this work, we examine five common software hardening techniques and study their impact on software fault-tolerance and security. We experimentally show that some of these techniques may improve fault-tolerance, while the others can reduce overall security. We offer a guideline for IoT developers seeking to make their software robust, and propose a tool for automatic software fault-tolerance evaluation
The Internet of Things (IoT) consists of resource-constrained devices (e.g., sensors and actuators) ...
Internet of Things (IoT) applications are being rapidly deployed in the context of smart homes, auto...
Software attacks like worm, botnet, and DDoS are the increasingly serious problems in IoT, which had...
The field of the Internet of Things (IoT) is growing at a breakneck pace and its applications are be...
Internet-Of-Things (IoT) devices and their firmware are notorious for their lifelong vulnerabilities...
Internet of Things (IoT) devices have rooted themselves in the everyday life of billions of people. ...
The Internet of Things (IoT) and the Android operating system have made cutting-edge technology acce...
Internet of Things devices are commonly overlooked when it comes to security. Deployment follows the...
Abstract: A trusted execution Environment (TEE) could be a comfy place of a computer’s essential pro...
Security in the current Internet of Things is not as good at it ought to be. This thesis shows some ...
\ua9 1997-2012 IEEE.In the Internet of Things (IoT) context, the landscape of weaknesses in the IoT ...
The Internet of Things (IoT) constitutes a digitally integrated network of intelligent devices equip...
Thesis (Master's)--University of Washington, 2017-06The use of Internet of Things (IoT) devices has ...
The use of Internet-of-Things (IoT) makes it possible to inter-connect Information Technology (IT) a...
In this paper we review and analyze redundancy-based fault-tolerant techniques for the IoT as a para...
The Internet of Things (IoT) consists of resource-constrained devices (e.g., sensors and actuators) ...
Internet of Things (IoT) applications are being rapidly deployed in the context of smart homes, auto...
Software attacks like worm, botnet, and DDoS are the increasingly serious problems in IoT, which had...
The field of the Internet of Things (IoT) is growing at a breakneck pace and its applications are be...
Internet-Of-Things (IoT) devices and their firmware are notorious for their lifelong vulnerabilities...
Internet of Things (IoT) devices have rooted themselves in the everyday life of billions of people. ...
The Internet of Things (IoT) and the Android operating system have made cutting-edge technology acce...
Internet of Things devices are commonly overlooked when it comes to security. Deployment follows the...
Abstract: A trusted execution Environment (TEE) could be a comfy place of a computer’s essential pro...
Security in the current Internet of Things is not as good at it ought to be. This thesis shows some ...
\ua9 1997-2012 IEEE.In the Internet of Things (IoT) context, the landscape of weaknesses in the IoT ...
The Internet of Things (IoT) constitutes a digitally integrated network of intelligent devices equip...
Thesis (Master's)--University of Washington, 2017-06The use of Internet of Things (IoT) devices has ...
The use of Internet-of-Things (IoT) makes it possible to inter-connect Information Technology (IT) a...
In this paper we review and analyze redundancy-based fault-tolerant techniques for the IoT as a para...
The Internet of Things (IoT) consists of resource-constrained devices (e.g., sensors and actuators) ...
Internet of Things (IoT) applications are being rapidly deployed in the context of smart homes, auto...
Software attacks like worm, botnet, and DDoS are the increasingly serious problems in IoT, which had...