all InfoSec news
Can Evil IoT Twins Be Identified? Now Yes, a Hardware Behavioral Fingerprinting Methodology. (arXiv:2106.08209v3 [cs.CR] UPDATED)
Web: http://arxiv.org/abs/2106.08209
Jan. 26, 2022, 2:20 a.m. | Pedro Miguel Sánchez Sánchez, José María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pé
cs.CR updates on arXiv.org arxiv.org
The connectivity and resource-constrained nature of single-board devices
opens up to cybersecurity concerns affecting Internet of Things (IoT)
scenarios. One of the most important issues is the presence of evil IoT twins.
Evil IoT twins are malicious devices, with identical hardware and software
specifications to authorized ones, that can provoke sensitive information
leakages, data poisoning, or privilege escalation in IoT scenarios. Combining
behavioral fingerprinting and Machine/Deep Learning (ML/DL) techniques is a
promising approach to identify evil IoT twins by detecting …
More from arxiv.org / cs.CR updates on arXiv.org
Latest InfoSec / Cyber Security Jobs
Senior Incident Responder
@ CipherTechs, Inc. | Remote
Data Security DevOps Engineer Senior/Intermediate
@ University of Michigan - ITS | Ann Arbor, MI
Senior Penetration Tester
@ CipherTechs, Inc. | Remote
Data Analyst
@ SkyePoint Decisions | Washington, DC
POA&M Analyst
@ SkyePoint Decisions | Washington, DC
PKI Systems Engineer
@ SkyePoint Decisions | Springfield, VA