Ali et al., 2018 - Google Patents
Trust in IoT: dynamic remote attestation through efficient behavior captureAli et al., 2018
View PDF- Document ID
- 2143787909223370998
- Author
- Ali T
- Nauman M
- Jan S
- Publication year
- Publication venue
- Cluster Computing
External Links
Snippet
Abstract The Internet of Things (IoT) is a latest concept of machine-to-machine communication, that also gave birth to several information security problems. Many traditional software solutions fail to address these security issues such as trustworthiness of …
- 230000006399 behavior 0 abstract description 63
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11636206B2 (en) | Deferred malware scanning | |
| US12101336B2 (en) | Security integration for cloud services | |
| JP7544738B2 (en) | Detecting Sensitive Data Exposure Through Logging | |
| Ali et al. | Trust in IoT: dynamic remote attestation through efficient behavior capture | |
| US11062024B2 (en) | Computer-security event security-violation detection | |
| Galal et al. | Behavior-based features model for malware detection | |
| US7530105B2 (en) | Tactical and strategic attack detection and prediction | |
| US10025929B2 (en) | Detection of anomalous program execution using hardware-based micro-architectural data | |
| CN109074454B (en) | Automatic malware grouping based on artifacts | |
| BR102015017215A2 (en) | computer-implemented method for classifying mobile applications, and computer program encoded on non-transient storage medium | |
| US20250168180A1 (en) | Analysis of endpoint detect and response data | |
| WO2023064007A1 (en) | Augmented threat investigation | |
| Akhtar | Malware detection and analysis: Challenges and research opportunities | |
| US20240396924A1 (en) | A top-down cyber security system and method | |
| Singh et al. | Static malware analysis using machine and deep learning | |
| Baychev et al. | Spearphishing malware: Do we really know the unknown? | |
| Bhavan et al. | Android malware detection: A comprehensive review | |
| Ali et al. | Efficient, scalable and privacy preserving application attestation in a multi stakeholder scenario | |
| Dhote et al. | Practice on detecting malware in virtualized environment of cloud | |
| Gundoor et al. | Integrating Machine Learning Techniques for Comprehensive Malware Classification | |
| Ali et al. | Design and implementation of an attestation protocol for measured dynamic behavior | |
| Zaharin et al. | Malware Classification Based on System Call | |
| Xu | Anomaly Detection through System and Program Behavior Modeling | |
| Liu | Scalable processing methods for host-based intrusion detection systems | |
| Chen et al. | Windows Registry Attack and Defense: Behavior Analysis and Persistence Detection Based on ETW |