Exploiting Memory Corruption Vulnerabilities in Connman for IoT Devices.
K. Virgil EnglishIslam ObaidatMeera SridharPublished in: DSN (2019)
Keyphrases
- data corruption
- mobile devices
- smart objects
- management system
- memory usage
- web services
- embedded devices
- storage devices
- past experience
- memory space
- computing power
- mobile applications
- big data
- information security
- countermeasures
- mobile computing
- key management
- power consumption
- cloud computing
- security vulnerabilities
- low cost
- neural network