Web: http://arxiv.org/abs/2106.08209

Jan. 26, 2022, 2:20 a.m. | Pedro Miguel Sánchez Sánchez, José María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pé

cs.CR updates on arXiv.org arxiv.org

The connectivity and resource-constrained nature of single-board devices
opens up to cybersecurity concerns affecting Internet of Things (IoT)
scenarios. One of the most important issues is the presence of evil IoT twins.
Evil IoT twins are malicious devices, with identical hardware and software
specifications to authorized ones, that can provoke sensitive information
leakages, data poisoning, or privilege escalation in IoT scenarios. Combining
behavioral fingerprinting and Machine/Deep Learning (ML/DL) techniques is a
promising approach to identify evil IoT twins by detecting …

fingerprinting hardware iot now

Senior Incident Responder

@ CipherTechs, Inc. | Remote

Data Security DevOps Engineer Senior/Intermediate

@ University of Michigan - ITS | Ann Arbor, MI

Senior Penetration Tester

@ CipherTechs, Inc. | Remote

Data Analyst

@ SkyePoint Decisions | Washington, DC

POA&M Analyst

@ SkyePoint Decisions | Washington, DC

PKI Systems Engineer

@ SkyePoint Decisions | Springfield, VA