Securing IoT/IIoT from Software Attacks Targeting Hardware Vulnerabilities.
Nikolaos Foivos PolychronouPierre-Henri ThevenonMaxime PuysVincent BeroullePublished in: NEWCAS (2021)
Keyphrases
- java virtual machine
- countermeasures
- information security
- security vulnerabilities
- security risks
- security mechanisms
- management system
- security flaws
- real time
- buffer overflow
- security issues
- security breaches
- hardware and software
- information systems
- big data
- software systems
- computer security
- security threats
- operating system
- cloud computing
- computer systems
- data corruption
- hardware platforms
- access control
- attack graphs
- signal processing