Reference : Logical Analysis of Cyber Vulnerability and Protection
Scientific journals : Article
Engineering, computing & technology : Computer science
Logical Analysis of Cyber Vulnerability and Protection
David, Esther [> >]
Gabbay, Dov M. mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Leshem, Guy [> >]
Students of CS Ashkelon [> >]
IfCoLog Journal of Logics and Their Applications
[en] The growth in IoT will far exceed that of other connected devices. In contrast to the rapid assimilation of the IoT devices and interfaces, the technology that ensures these systems are safe and secure is left behind. The IoT safety, security and privacy is composed of several key aspects. Attention has already been given to vulnerabilities associated with networked systems as authentication and encryption. However there exist more vulnerabilities issues in IoT systems for which we aim to develop a detection methodology and propose possible solutions. Specifically, here we propose techniques for security verification of an IoT system that mainly involves inconsistency and vulnerability. The proposed methods are logic based techniques that were developed especially for the new challenges that the IoT environment is facing.

File(s) associated to this reference

Fulltext file(s):

Limited access
Gabbay et al (SAJL).pdfAuthor preprint959.48 kBRequest a copy

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.