Attack Surface Area

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 39 Experts worldwide ranked by ideXlab platform

Sakir Sezer - One of the best experts on this subject based on the ideXlab platform.

  • PST - Enhancing Security and Privacy of Next-Generation Edge Computing Technologies
    2019 17th International Conference on Privacy Security and Trust (PST), 2019
    Co-Authors: Matthew Hagan, Fahad Manzoor Siddiqui, Sakir Sezer
    Abstract:

    The advent of high performance fog and edge computing and high bandwidth connectivity has brought about changes to Internet-of-Things (IoT) service architectures, allowing for greater quantities of high quality information to be extracted from their environments to be processed. However, recently introduced international regulations, along with heightened awareness among consumers, have strengthened requirements to ensure data security, with significant financial and reputational penalties for organisations who fail to protect customers' data. This paper proposes the leveraging of fog and edge computing to facilitate processing of confidential user data, to reduce the quantity and availability of raw confidential data at various levels of the IoT architecture. This ultimately reduces Attack Surface Area, however it also increases efficiency of the architecture by distributing processing amongst nodes and transmitting only processed data. However, such an approach is vulnerable to device level Attacks. To approach this issue, a proposed System Security Manager is used to continuously monitor system resources and ensure confidential data is confined only to parts of the device that require it. In event of an Attack, critical data can be isolated and the system informed, to prevent data confidentiality breach.

  • Enhancing Security and Privacy of Next-Generation Edge Computing Technologies
    2019 17th International Conference on Privacy Security and Trust (PST), 2019
    Co-Authors: Matthew Hagan, Fahad Siddiqui, Sakir Sezer
    Abstract:

    The advent of high performance fog and edge computing and high bandwidth connectivity has brought about changes to Internet-of-Things (IoT) service architectures, allowing for greater quantities of high quality information to be extracted from their environments to be processed. However, recently introduced international regulations, along with heightened awareness among consumers, have strengthened requirements to ensure data security, with significant financial and reputational penalties for organisations who fail to protect customers' data. This paper proposes the leveraging of fog and edge computing to facilitate processing of confidential user data, to reduce the quantity and availability of raw confidential data at various levels of the IoT architecture. This ultimately reduces Attack Surface Area, however it also increases efficiency of the architecture by distributing processing amongst nodes and transmitting only processed data. However, such an approach is vulnerable to device level Attacks. To approach this issue, a proposed System Security Manager is used to continuously monitor system resources and ensure confidential data is confined only to parts of the device that require it. In event of an Attack, critical data can be isolated and the system informed, to prevent data confidentiality breach.

Matthew Hagan - One of the best experts on this subject based on the ideXlab platform.

  • PST - Enhancing Security and Privacy of Next-Generation Edge Computing Technologies
    2019 17th International Conference on Privacy Security and Trust (PST), 2019
    Co-Authors: Matthew Hagan, Fahad Manzoor Siddiqui, Sakir Sezer
    Abstract:

    The advent of high performance fog and edge computing and high bandwidth connectivity has brought about changes to Internet-of-Things (IoT) service architectures, allowing for greater quantities of high quality information to be extracted from their environments to be processed. However, recently introduced international regulations, along with heightened awareness among consumers, have strengthened requirements to ensure data security, with significant financial and reputational penalties for organisations who fail to protect customers' data. This paper proposes the leveraging of fog and edge computing to facilitate processing of confidential user data, to reduce the quantity and availability of raw confidential data at various levels of the IoT architecture. This ultimately reduces Attack Surface Area, however it also increases efficiency of the architecture by distributing processing amongst nodes and transmitting only processed data. However, such an approach is vulnerable to device level Attacks. To approach this issue, a proposed System Security Manager is used to continuously monitor system resources and ensure confidential data is confined only to parts of the device that require it. In event of an Attack, critical data can be isolated and the system informed, to prevent data confidentiality breach.

  • Enhancing Security and Privacy of Next-Generation Edge Computing Technologies
    2019 17th International Conference on Privacy Security and Trust (PST), 2019
    Co-Authors: Matthew Hagan, Fahad Siddiqui, Sakir Sezer
    Abstract:

    The advent of high performance fog and edge computing and high bandwidth connectivity has brought about changes to Internet-of-Things (IoT) service architectures, allowing for greater quantities of high quality information to be extracted from their environments to be processed. However, recently introduced international regulations, along with heightened awareness among consumers, have strengthened requirements to ensure data security, with significant financial and reputational penalties for organisations who fail to protect customers' data. This paper proposes the leveraging of fog and edge computing to facilitate processing of confidential user data, to reduce the quantity and availability of raw confidential data at various levels of the IoT architecture. This ultimately reduces Attack Surface Area, however it also increases efficiency of the architecture by distributing processing amongst nodes and transmitting only processed data. However, such an approach is vulnerable to device level Attacks. To approach this issue, a proposed System Security Manager is used to continuously monitor system resources and ensure confidential data is confined only to parts of the device that require it. In event of an Attack, critical data can be isolated and the system informed, to prevent data confidentiality breach.

Tamas Kiss - One of the best experts on this subject based on the ideXlab platform.

  • Charlie and the CryptoFactory: Towards Secure and Trusted Manufacturing Environments
    2020 IEEE 20th Mediterranean Electrotechnical Conference ( MELECON), 2020
    Co-Authors: Antonis Michalas, Tamas Kiss
    Abstract:

    The modernization that stems from Industry 4.0 started populating the manufacturing sector with networked devices, complex sensors, and a significant proportion of physical actuation components. However, new capabilities in networked cyber-physical systems demand more complex infrastructure and algorithms and often lead to new security flaws and operational risks that increase the Attack Surface Area exponentially. The interconnected nature of Industry 4.0-driven operations and the pace of digital transformation mean that cyberAttacks can have far more extensive effects than ever before. Based on that, the core ideas of this paper are driven by the observation that cybersecurity is one of the key enablers of Industry 4.0. Having this in mind, we propose CryptoFactory - a forward-looking design of a layered-based architecture that can be used as a starting point for building secure and privacy-preserving smart factories. CryptoFactory aims to change the security outlook in smart manufacturing by discussing a set of fundamental requirements and functionality that modern factories should support in order to be resistant to both internal and external Attacks. To this end, CryptoFactory first focuses on how to build trust relationships between the hardware devices in the factory. Then, we look on how to use several cryptographic approaches to allow IoT devices to securely collect, store and share their data while we also touch upon the emerging topic of secure and privacy-preserving communication and collaboration between manufacturing environments and value chains. Finally, we look into the problem of how to perform privacy-preserving analytics by leveraging Trusted Execution Environments and the promising concept of Functional Encryption.

Anup K. Ghosh - One of the best experts on this subject based on the ideXlab platform.

  • Moving Target Defense - Introducing Diversity and Uncertainty to Create Moving Attack Surfaces for Web Services
    Advances in Information Security, 2011
    Co-Authors: Yih Huang, Anup K. Ghosh
    Abstract:

    Web servers are primary targets for cyber Attack because of the documents they may contain, transactions they support, or the opportunity to cause brand damage or reputational embarrassment to the victim organization. Today most web services are implemented by employing a fixed software stack that includes a web server program, web application programs, an operating system, and a virtualization layer. This software mix as a whole constitutes the Attack Surface of the web service and a vulnerability in one of the components that make up the web service is a potential threat to the entire service. This chapter presents an approach that employs a rotational scheme for substituting different software stacks for any given request in order to create a dynamic and uncertain Attack Surface Area of the system. In particular, our approach automatically creates a set of diverse virtual servers (VSs), each configured with a unique software mix, producing diversified Attack Surfaces. Our approach includes a rotational scheme with a set of diversified offline servers rotating in to replace a set of diversified online servers on either a fixed rotation schedule or an event-driven basis. Assuming N different VSs, M < N of them will serve online at a time while off-line VSs are reverted to predefined pristine state. By constantly changing the set of M online VSs and introducing randomness in their selections, Attackers will face multiple, constantly changing, and unpredictable Attack Surfaces.

Adriano Tavares - One of the best experts on this subject based on the ideXlab platform.

  • IIoTEED: An Enhanced, Trusted Execution Environment for Industrial IoT Edge Devices
    IEEE Internet Computing, 2017
    Co-Authors: Sandro Pinto, Jorge Cabral, Tiago Gomes, Jorge Pereira, Adriano Tavares
    Abstract:

    With the advent of the Internet of Things (IoT), security has emerged as a major design goal for smart connected devices. This explosion in connectivity created a larger Attack Surface Area. Software-based approaches have been applied for security purposes; however, these methods must be extended with security-oriented technologies that promote hardware as the root of trust. The ARM TrustZone can enable trusted execution environments (TEEs), but existing solutions disregard real-time needs. Here, the authors demonstrate why TrustZone is becoming a reference technology for securing IoT edge devices, and how enhanced TEEs can help meet industrial IoT applications real-time requirements.