The Internet of Things (IoT) produces and processes large amounts of data. Among these data, some must be protected and others must be carefully handled because they come from untrusted sources. Taint analysis techniques can be used to for marking data and for monitoring their propagation at run time, so to determine how they influence the rest of the computation. Starting from the specification language IoT-LySa, we propose a Control Flow Analysis for statically predicting how tainted data spread across an IoT system and for checking whether those computations considered security critical are not affected by tainted data
In this chapter, the problem of detection and prevention systems for Internet of Things attacks is d...
More smart objects and more applications on the Internet of Things (IoT) mean more security challeng...
IoT apps are becoming increasingly popular as they allow users to manage their digital lives by conn...
The Internet of Things (IoT) produces and processes large amounts of data. Among these data, some m...
The Internet of Things (IoT) is leading to a smartification of our society: we are surrounded by man...
The Internet of Things (IoT) is deeply changing our society. Daily we use smart devices that automa...
The Internet of Things (IoT) is smartifying our everyday life. Our starting point is IoT-LySa, a cal...
The Internet of Things (IoT) offers the infrastructure of the information society. It hosts smart ob...
The Internet of Things is deeply shaping our society and our lives. Smart devices automatically coll...
The Internet of Things (IoT) devices access and process large amounts of data. Some of them are sens...
The Internet of Things (IoT) is a key component for the next disruptive technologies. However, IoT m...
Significant fractions of our lives are spent digitally, connected to and dependent on Internet-based...
The global Internet of Things (IoT) market is growing rapidly. It is predicted that the total global...
Cross-program propagation of tainted data (such as sensitive information or user input) in an intera...
In this chapter, the problem of detection and prevention systems for Internet of Things attacks is d...
More smart objects and more applications on the Internet of Things (IoT) mean more security challeng...
IoT apps are becoming increasingly popular as they allow users to manage their digital lives by conn...
The Internet of Things (IoT) produces and processes large amounts of data. Among these data, some m...
The Internet of Things (IoT) is leading to a smartification of our society: we are surrounded by man...
The Internet of Things (IoT) is deeply changing our society. Daily we use smart devices that automa...
The Internet of Things (IoT) is smartifying our everyday life. Our starting point is IoT-LySa, a cal...
The Internet of Things (IoT) offers the infrastructure of the information society. It hosts smart ob...
The Internet of Things is deeply shaping our society and our lives. Smart devices automatically coll...
The Internet of Things (IoT) devices access and process large amounts of data. Some of them are sens...
The Internet of Things (IoT) is a key component for the next disruptive technologies. However, IoT m...
Significant fractions of our lives are spent digitally, connected to and dependent on Internet-based...
The global Internet of Things (IoT) market is growing rapidly. It is predicted that the total global...
Cross-program propagation of tainted data (such as sensitive information or user input) in an intera...
In this chapter, the problem of detection and prevention systems for Internet of Things attacks is d...
More smart objects and more applications on the Internet of Things (IoT) mean more security challeng...
IoT apps are becoming increasingly popular as they allow users to manage their digital lives by conn...