Attack Surface Area - Explore the Science & Experts | ideXlab

Scan Science and Technology

Contact Leading Edge Experts & Companies

Attack Surface Area

The Experts below are selected from a list of 39 Experts worldwide ranked by ideXlab platform

Sakir Sezer – One of the best experts on this subject based on the ideXlab platform.

  • PST – Enhancing Security and Privacy of Next-Generation Edge Computing Technologies
    2019 17th International Conference on Privacy Security and Trust (PST), 2019
    Co-Authors: Matthew Hagan, Fahad Manzoor Siddiqui, Sakir Sezer

    Abstract:

    The advent of high performance fog and edge computing and high bandwidth connectivity has brought about changes to Internet-of-Things (IoT) service architectures, allowing for greater quantities of high quality information to be extracted from their environments to be processed. However, recently introduced international regulations, along with heightened awareness among consumers, have strengthened requirements to ensure data security, with significant financial and reputational penalties for organisations who fail to protect customers’ data. This paper proposes the leveraging of fog and edge computing to facilitate processing of confidential user data, to reduce the quantity and availability of raw confidential data at various levels of the IoT architecture. This ultimately reduces Attack Surface Area, however it also increases efficiency of the architecture by distributing processing amongst nodes and transmitting only processed data. However, such an approach is vulnerable to device level Attacks. To approach this issue, a proposed System Security Manager is used to continuously monitor system resources and ensure confidential data is confined only to parts of the device that require it. In event of an Attack, critical data can be isolated and the system informed, to prevent data confidentiality breach.

  • Enhancing Security and Privacy of Next-Generation Edge Computing Technologies
    2019 17th International Conference on Privacy Security and Trust (PST), 2019
    Co-Authors: Matthew Hagan, Fahad Siddiqui, Sakir Sezer

    Abstract:

    The advent of high performance fog and edge computing and high bandwidth connectivity has brought about changes to Internet-of-Things (IoT) service architectures, allowing for greater quantities of high quality information to be extracted from their environments to be processed. However, recently introduced international regulations, along with heightened awareness among consumers, have strengthened requirements to ensure data security, with significant financial and reputational penalties for organisations who fail to protect customers’ data. This paper proposes the leveraging of fog and edge computing to facilitate processing of confidential user data, to reduce the quantity and availability of raw confidential data at various levels of the IoT architecture. This ultimately reduces Attack Surface Area, however it also increases efficiency of the architecture by distributing processing amongst nodes and transmitting only processed data. However, such an approach is vulnerable to device level Attacks. To approach this issue, a proposed System Security Manager is used to continuously monitor system resources and ensure confidential data is confined only to parts of the device that require it. In event of an Attack, critical data can be isolated and the system informed, to prevent data confidentiality breach.

Matthew Hagan – One of the best experts on this subject based on the ideXlab platform.

  • PST – Enhancing Security and Privacy of Next-Generation Edge Computing Technologies
    2019 17th International Conference on Privacy Security and Trust (PST), 2019
    Co-Authors: Matthew Hagan, Fahad Manzoor Siddiqui, Sakir Sezer

    Abstract:

    The advent of high performance fog and edge computing and high bandwidth connectivity has brought about changes to Internet-of-Things (IoT) service architectures, allowing for greater quantities of high quality information to be extracted from their environments to be processed. However, recently introduced international regulations, along with heightened awareness among consumers, have strengthened requirements to ensure data security, with significant financial and reputational penalties for organisations who fail to protect customers’ data. This paper proposes the leveraging of fog and edge computing to facilitate processing of confidential user data, to reduce the quantity and availability of raw confidential data at various levels of the IoT architecture. This ultimately reduces Attack Surface Area, however it also increases efficiency of the architecture by distributing processing amongst nodes and transmitting only processed data. However, such an approach is vulnerable to device level Attacks. To approach this issue, a proposed System Security Manager is used to continuously monitor system resources and ensure confidential data is confined only to parts of the device that require it. In event of an Attack, critical data can be isolated and the system informed, to prevent data confidentiality breach.

  • Enhancing Security and Privacy of Next-Generation Edge Computing Technologies
    2019 17th International Conference on Privacy Security and Trust (PST), 2019
    Co-Authors: Matthew Hagan, Fahad Siddiqui, Sakir Sezer

    Abstract:

    The advent of high performance fog and edge computing and high bandwidth connectivity has brought about changes to Internet-of-Things (IoT) service architectures, allowing for greater quantities of high quality information to be extracted from their environments to be processed. However, recently introduced international regulations, along with heightened awareness among consumers, have strengthened requirements to ensure data security, with significant financial and reputational penalties for organisations who fail to protect customers’ data. This paper proposes the leveraging of fog and edge computing to facilitate processing of confidential user data, to reduce the quantity and availability of raw confidential data at various levels of the IoT architecture. This ultimately reduces Attack Surface Area, however it also increases efficiency of the architecture by distributing processing amongst nodes and transmitting only processed data. However, such an approach is vulnerable to device level Attacks. To approach this issue, a proposed System Security Manager is used to continuously monitor system resources and ensure confidential data is confined only to parts of the device that require it. In event of an Attack, critical data can be isolated and the system informed, to prevent data confidentiality breach.

Tamas Kiss – One of the best experts on this subject based on the ideXlab platform.

  • Charlie and the CryptoFactory: Towards Secure and Trusted Manufacturing Environments
    2020 IEEE 20th Mediterranean Electrotechnical Conference ( MELECON), 2020
    Co-Authors: Antonis Michalas, Tamas Kiss

    Abstract:

    The modernization that stems from Industry 4.0 started populating the manufacturing sector with networked devices, complex sensors, and a significant proportion of physical actuation components. However, new capabilities in networked cyber-physical systems demand more complex infrastructure and algorithms and often lead to new security flaws and operational risks that increase the Attack Surface Area exponentially. The interconnected nature of Industry 4.0-driven operations and the pace of digital transformation mean that cyberAttacks can have far more extensive effects than ever before. Based on that, the core ideas of this paper are driven by the observation that cybersecurity is one of the key enablers of Industry 4.0. Having this in mind, we propose CryptoFactory – a forward-looking design of a layered-based architecture that can be used as a starting point for building secure and privacy-preserving smart factories. CryptoFactory aims to change the security outlook in smart manufacturing by discussing a set of fundamental requirements and functionality that modern factories should support in order to be resistant to both internal and external Attacks. To this end, CryptoFactory first focuses on how to build trust relationships between the hardware devices in the factory. Then, we look on how to use several cryptographic approaches to allow IoT devices to securely collect, store and share their data while we also touch upon the emerging topic of secure and privacy-preserving communication and collaboration between manufacturing environments and value chains. Finally, we look into the problem of how to perform privacy-preserving analytics by leveraging Trusted Execution Environments and the promising concept of Functional Encryption.