[HTML][HTML] Securing cloud-based internet of things: challenges and mitigations

N Singh, R Buyya, H Kim - Sensors, 2024 - mdpi.com
The Internet of Things (IoT) has seen remarkable advancements in recent years, leading to a
paradigm shift in the digital landscape. However, these technological strides have …

Preventing or mitigating adversarial supply chain attacks: A legal analysis

KR Ludvigsen, S Nagaraja, A Daly - … of the 2022 ACM Workshop on …, 2022 - dl.acm.org
The world is currently strongly connected through both the internet at large, but also the very
supply chains which provide everything from food to infrastructure and technology. The …

{CellDAM}:{User-Space}, Rootless Detection and Mitigation for 5G Data Plane

Z Tan, J Zhao, B Ding, S Lu - 20th USENIX Symposium on Networked …, 2023 - usenix.org
Despite all deployed security fences in 5G, attacks against its data plane are still feasible. A
smart attacker can fabricate data packets or intelligently forge/drop/modify data-plane …

[PDF][PDF] IoT in the Cloud: Exploring Security Challenges and Mitigations for a Connected World

N Singh, R Buyya, H Kim - arXiv, 2024 - arxiv.org
ABSTRACT The Internet of Things (IoT) has seen remarkable advancements in recent years,
leading to a paradigm shift in the digital landscape. However, these technological strides …

Uncovering insecure designs of cellular emergency services (911)

Y Hu, MY Chen, GH Tu, CY Li, S Wang, J Shi… - Proceedings of the 28th …, 2022 - dl.acm.org
Cellular networks that offer ubiquitous connectivity have been the major medium for
delivering emergency services. In the US, mobile users can dial an emergency call with 911 …

Security Weaknesses in IoT Management Platforms

B Tejaswi, M Mannan, A Youssef - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
A diverse set of Internet of Things (IoT) devices are becoming an integrated part of daily
lives, and playing an increasingly vital role in various industry, enterprise and agricultural …

Breaking cellular iot with forged data-plane signaling: Attacks and countermeasure

Z Tan, B Ding, J Zhao, Y Guo, S Lu - ACM Transactions on Sensor …, 2022 - dl.acm.org
We devise new attacks exploiting the unprotected data-plane signaling in cellular IoT
networks (aka both NB-IoT and Cat-M). We show that, despite the deployed security …

IMS is Not That Secure on Your 5G/4G Phones

J Shi, S Wang, MY Chen, GH Tu, T Xie… - Proceedings of the 30th …, 2024 - dl.acm.org
IMS (IP Multimedia Subsystem) is vital for delivering IP-based multimedia services in mobile
networks. Despite constant upgrades by 3GPP over the past two decades to support …

Taming the Insecurity of Cellular Emergency Services (9-1-1): From Vulnerabilities to Secure Designs

MY Chen, Y Hu, GH Tu, CY Li, S Wang… - IEEE/ACM …, 2024 - ieeexplore.ieee.org
Cellular networks, vital for delivering emergency services, enable mobile users to dial
emergency calls (eg, 9-1-1 in the US), which are forwarded to public safety answer points …

Knocking Cells: Latency-Based Identification of IPv6 Cellular Addresses on the Internet

M Wang, Y Li, H Zhang, A Hong, J He… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
IPv6 mobile networks are becoming increasingly important. Many jobs rely on
understanding IPv6 mobile networks at the IP level. Previous works on cellular identification …