IoT Vulnerabilities and Attacks: SILEX Malware Case Study.
Basem Ibrahim MukhtarMahmoud Said ElsayedAnca D. JurcutMarianne A. AzerPublished in: Symmetry (2023)
Keyphrases
- attack scenarios
- case study
- countermeasures
- security vulnerabilities
- security flaws
- security risks
- detect malicious
- attack detection
- security mechanisms
- intrusion detection system
- security problems
- attack graphs
- alert correlation
- buffer overflow
- security issues
- information security
- malicious code
- management system
- denial of service
- dos attacks
- cloud computing
- security threats
- intrusion detection
- anti virus
- computer security
- detecting malicious
- data corruption
- reverse engineering
- security protocols
- security breaches
- key management
- business process
- software development
- web services
- authentication scheme
- location information
- watermarking scheme
- network security
- security measures
- denial of service attacks
- real world
- static analysis
- big data