Significant fractions of our lives are spent digitally, connected to and dependent on Internet-based applications, be it through the Web, mobile, or IoT. All such applications have access to and are entrusted with private user data, such as location, photos, browsing habits, private feed from social networks, or bank details.In this thesis, we focus on IoT and Web(Assembly) apps. We demonstrate IoT apps to be vulnerable to attacks by malicious app makers who are able to bypass the sandboxing mechanisms enforced by the platform to stealthy exfiltrate user data. We further give examples of carefully crafted WebAssembly code abusing the semantics to leak user data.We are interested in applying language-based technologies to ensure application ...
This paper examines the security methods in the Internet-of-Things. The security methods are careful...
The Internet of Things (IoT) is being hailed as the next wave revolutionizing our society. Smart hom...
This paper discusses how to ensure security, i.e., confidentiality and integrity properties, for dat...
IoT apps are becoming increasingly popular as they allow users to manage their digital lives by conn...
IoT apps empower users by connecting a variety of otherwise unconnected services. These apps (or app...
The Internet of Things (IoT) is a reality technology which has provided tremendous opportunities for...
The Internet of Things (IoT) produces and processes large amounts of data. Among these data, some m...
Kevin Ashton first used the term Internet of Things (IoT) in 1999 to describe a system in which obje...
<p>The Web is evolving into a melting pot of content coming from multiple stakeholders. In this mutu...
Our homes, hospitals, cities, and industries are being enhanced with devices that have computational...
Internet-of-Thing (IoT) is a rapid-emerging technology that exploits the concept of inter-network to...
The boom of the Internet of Things (IoT) brings great convenience to the society by connecting the p...
In this chapter, the problem of detection and prevention systems for Internet of Things attacks is d...
2022 Spring.Includes bibliographical references.Internet of Thing (IoT) devices are being widely use...
The field of IoT web applications is facing a range of security risks and system attacks due to the ...
This paper examines the security methods in the Internet-of-Things. The security methods are careful...
The Internet of Things (IoT) is being hailed as the next wave revolutionizing our society. Smart hom...
This paper discusses how to ensure security, i.e., confidentiality and integrity properties, for dat...
IoT apps are becoming increasingly popular as they allow users to manage their digital lives by conn...
IoT apps empower users by connecting a variety of otherwise unconnected services. These apps (or app...
The Internet of Things (IoT) is a reality technology which has provided tremendous opportunities for...
The Internet of Things (IoT) produces and processes large amounts of data. Among these data, some m...
Kevin Ashton first used the term Internet of Things (IoT) in 1999 to describe a system in which obje...
<p>The Web is evolving into a melting pot of content coming from multiple stakeholders. In this mutu...
Our homes, hospitals, cities, and industries are being enhanced with devices that have computational...
Internet-of-Thing (IoT) is a rapid-emerging technology that exploits the concept of inter-network to...
The boom of the Internet of Things (IoT) brings great convenience to the society by connecting the p...
In this chapter, the problem of detection and prevention systems for Internet of Things attacks is d...
2022 Spring.Includes bibliographical references.Internet of Thing (IoT) devices are being widely use...
The field of IoT web applications is facing a range of security risks and system attacks due to the ...
This paper examines the security methods in the Internet-of-Things. The security methods are careful...
The Internet of Things (IoT) is being hailed as the next wave revolutionizing our society. Smart hom...
This paper discusses how to ensure security, i.e., confidentiality and integrity properties, for dat...