References of "David, Esther"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailLogical Analysis of Cyber Vulnerability and Protection
David, Esther; Gabbay, Dov M. UL; Leshem, Guy et al

in The IfCoLog Journal of Logics and their Applications (2017)

The growth in IoT will far exceed that of other connected devices. In contrast to the rapid assimilation of the IoT devices and interfaces, the technology that ensures these systems are safe and secure is ... [more ▼]

The growth in IoT will far exceed that of other connected devices. In contrast to the rapid assimilation of the IoT devices and interfaces, the technology that ensures these systems are safe and secure is left behind. The IoT safety, security and privacy is composed of several key aspects. Attention has already been given to vulnerabilities associated with networked systems as authentication and encryption. However there exist more vulnerabilities issues in IoT systems for which we aim to develop a detection methodology and propose possible solutions. Specifically, here we propose techniques for security verification of an IoT system that mainly involves inconsistency and vulnerability. The proposed methods are logic based techniques that were developed especially for the new challenges that the IoT environment is facing. [less ▲]

Detailed reference viewed: 16 (2 UL)