作者
Meng Xu, Manuel Huber, Zhichuang Sun, Paul England, Marcus Peinado, Sangho Lee, Andrey Marochko, Dennis Mattoon, Rob Spiger, Stefan Thom
发表日期
2019/5/19
研讨会论文
2019 IEEE Symposium on Security and Privacy (SP)
页码范围
1415-1430
出版商
IEEE
简介
The Internet of Things (IoT) is rapidly emerging as one of the dominant computing paradigms of this decade. Applications range from in-home entertainment to large-scale industrial deployments such as controlling assembly lines and monitoring traffic. While IoT devices are in many respects similar to traditional computers, user expectations and deployment scenarios as well as cost and hardware constraints are sufficiently different to create new security challenges as well as new opportunities. This is especially true for large-scale IoT deployments in which a central entity deploys and controls a large number of IoT devices with minimal human interaction. Like traditional computers, IoT devices are subject to attack and compromise. Large IoT deployments consisting of many nearly identical devices are especially attractive targets. At the same time, recovery from root compromise by conventional means becomes …
引用总数
2020202120222023202451520206
学术搜索中的文章
M Xu, M Huber, Z Sun, P England, M Peinado, S Lee… - 2019 IEEE Symposium on Security and Privacy (SP), 2019