A taxonomy of IoT firmware security and principal firmware analysis techniques

I Nadir, H Mahmood, G Asadullah - International Journal of Critical …, 2022 - Elsevier
Abstract Internet of Things (IoT) has come a long way since its inception. However, the
standardization process in IoT systems for a secure IoT solution is still in its early days …

All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)

EJ Schwartz, T Avgerinos… - 2010 IEEE symposium on …, 2010 - ieeexplore.ieee.org
Dynamic taint analysis and forward symbolic execution are quickly becoming staple
techniques in security analyses. Example applications of dynamic taint analysis and forward …

xDBAuth: Blockchain based cross domain authentication and authorization framework for Internet of Things

G Ali, N Ahmad, Y Cao, S Khan, H Cruickshank… - IEEE …, 2020 - ieeexplore.ieee.org
The innovation of ubiquitous and pervasive computing helps service-oriented organizations
in the realization of a virtual coalition. The virtual coalition is a set of IoT domains ie, smart …

Blockchain based permission delegation and access control in Internet of Things (BACI)

G Ali, N Ahmad, Y Cao, M Asif, H Cruickshank… - Computers & Security, 2019 - Elsevier
Access control with permission delegation mechanism allows fine granular access to secure
resources. In the literature, existing architectures for permission delegation and access …

BlockAuth: A blockchain-based framework for secure vehicle authentication and authorization

G Ali, M ElAffendi, N Ahmad - Plos one, 2023 - journals.plos.org
Intelligent Transport System (ITS) offers inter-vehicle communication, safe driving, road
condition updates, and intelligent traffic management. This research intends to propose a …

Multi‐tenancy authorization models for collaborative cloud services

B Tang, R Sandhu, Q Li - Concurrency and Computation …, 2015 - Wiley Online Library
The cloud service model intrinsically caters to multiple tenants, most obviously not only in
public clouds but also in private clouds for large organizations. Currently, most cloud service …

[HTML][HTML] Blockchain-based cross-domain authorization system for user-centric resource sharing

Y Ezawa, S Kakei, Y Shiraishi, M Mohri… - Blockchain: Research and …, 2023 - Elsevier
User-centric data sharing is essential to encourage citizens' active participation in the digital
economy. One key to smart cities, a form of the digital economy, is the promotion of public …

A multi-tenant RBAC model for collaborative cloud services

B Tang, Q Li, R Sandhu - 2013 eleventh annual conference on …, 2013 - ieeexplore.ieee.org
Most cloud services are built with multi-tenancy which enables data and configuration
segregation upon shared infrastructures. In this setting, a tenant temporarily uses a piece of …

Cross-domain security and interoperability in internet of things

S Zahra, W Gong, HA Khattak… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The Internet of Things advancements has enabled smart city scenarios worldwide. A tight nit
communication, on the one hand, is required for device management and monitoring, but on …

BCON: Blockchain based access CONtrol across multiple conflict of interest domains

G Ali, N Ahmad, Y Cao, QE Ali, F Azim… - Journal of Network and …, 2019 - Elsevier
In today's on-demand computing and virtual coalition environment, cross-domain services
are acquired and provided. These business domains may belong to either the same or …