CrySyS Lab Publications
This new trend is called the Internet of Things, or IoT in short, and it enables many new and exciting applications. At the same time, however, it also creates a number of new risks related to information security.
Indeed, several recent attacks on IoT devices and systems illustrate that they are notoriously insecure. One potential risk to consider is that embedding computers into everyday objects and connecting them to the Internet exposes our physical world to attacks originating from the cyber space.
This means that cyber attacks on IoT systems may have physical consequences: depending on the nature of the system, they may lead to damage of physical equipment e.
Another problem is that embedded devices with no or weak protection, when connected to the Internet, can put Internet based services and the Internet infrastructure itself at risk.
Indeed, weakly protected WiFi routers, web cameras, and other smart devices connected to the Internet are low bitcoin kereskedő app cápa tartály fruits for attackers that they can bitcoin generator hack scam easily and use to build a massive attack infrastructure.
An example for this is the Mirai botnetwhich consisted in millions of compromised IoT devices that were used in the largest DDoS attack ever targeting the Domain Name System of the Internet and making popular Internet based services unavailable.
FREE BITCOIN CLAIM EVERY 15 MINUTES! NO INVESTMENT - WITHDRAW 0.24 BTC FREE
For this purpose, we work on security enhancing technologies mechanisms, tools, and methods applicable in the IoT context. More specifically, we focus on 3 bitcoin generator hack scam areas within the project: 1. Application level bitcoin generator hack scam for embedded devices used in IoT systems IoT application logic is implemented in software running on embedded devices and servers, and it is well-known that software vulnerabilities are the primary enablers of successful attacks on many system.
Therefore, in this part of the project, we work on detecting software vulnerabilities using different program analysis techniques. This includes detecting vulnerabilities in the applications themselves, as well as in third party software components and libraries used by the applications.
Besides advancing some static and dynamic program analysis methods, we develop new statistical and machine learning algorithms for predicting errors in application source code.
Platform level security for embedded devices used in IoT systems Platform level security is concerned with the security of the embedded computing platform on which applications actually run on IoT devices.
This is important, because compromising the platform enables an attacker to take full control over the device, including all applications running on it. We work on securing the boot process, hardening the OS, and continuously monitoring the integrity of the software running on the device.
We also work on secure remote software update, as well as implementing trusted services on the device such as secure data storage and communications. In addition, we develop a penetration testing ethical hacking methodology customized for IoT systems.
Algebraic background and cryptographic algortihms that support areas 1 and 2. In this part of the project, we design and analyze cryptographic algorithms and protocols for IoT applications that fit better the resource constrained environment of IoT systems than traditional cryptographic mechanisms used on the Internet.
We also aim at better understanding the algebraic properties underlying some of those cryptographic tools. Project partners.