IoTProtect: Highly Deployable Whitelist-based Protection for Low-cost Internet-of-Things Devices
暂无分享,去创建一个
Tsutomu Matsumoto | Satoshi Hara | Katsunari Yoshioka | Akira Fujita | Ying Tie | Chun-Jung Wu | Kazuki Tamiya | Tsutomu Matsumoto | K. Yoshioka | Akira Fujita | Chun-Jung Wu | Kazuki Tamiya | Ying Tie | S. Hara | Tsutomu Matsumoto
[1] Somesh Jha,et al. Automatic Generation of Remediation Procedures for Malware Infections , 2010, USENIX Security Symposium.
[2] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[3] Muddassar Farooq,et al. In-Execution Malware Detection Using Task Structures of Linux Processes , 2011, 2011 IEEE International Conference on Communications (ICC).
[4] Tsutomu Matsumoto,et al. IoTPOT: A Novel Honeypot for Revealing Current IoT Threats , 2016, J. Inf. Process..
[5] Patrick Mochel. The sysfs Filesystem , 2005 .
[6] Peter Snyder,et al. tmpfs: A Virtual Memory File System , 1990 .
[7] Crispin Cowan,et al. Linux security modules: general security support for the linux kernel , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[8] David Woodhouse,et al. JFFS : The Journalling Flash File System , 2001 .
[9] Sebastian Obermeier,et al. Securing industrial automation and control systems using application whitelisting , 2014, Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA).
[10] Carlo A. Furia,et al. A Comparative Study of Programming Languages in Rosetta Code , 2014, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.