Article (Scientific journals)
Logical Analysis of Cyber Vulnerability and Protection
David, Esther; Gabbay, Dov M.; Leshem, Guy et al.
2017In IfCoLog Journal of Logics and Their Applications
Peer reviewed
 

Files


Full Text
Gabbay et al (SAJL).pdf
Author preprint (982.51 kB)
Request a copy

All documents in ORBilu are protected by a user license.

Send to



Details



Abstract :
[en] The growth in IoT will far exceed that of other connected devices. In contrast to the rapid assimilation of the IoT devices and interfaces, the technology that ensures these systems are safe and secure is left behind. The IoT safety, security and privacy is composed of several key aspects. Attention has already been given to vulnerabilities associated with networked systems as authentication and encryption. However there exist more vulnerabilities issues in IoT systems for which we aim to develop a detection methodology and propose possible solutions. Specifically, here we propose techniques for security verification of an IoT system that mainly involves inconsistency and vulnerability. The proposed methods are logic based techniques that were developed especially for the new challenges that the IoT environment is facing.
Disciplines :
Computer science
Author, co-author :
David, Esther
Gabbay, Dov M. ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Leshem, Guy
Students of CS Ashkelon
External co-authors :
yes
Language :
English
Title :
Logical Analysis of Cyber Vulnerability and Protection
Publication date :
2017
Journal title :
IfCoLog Journal of Logics and Their Applications
Peer reviewed :
Peer reviewed
Available on ORBilu :
since 12 January 2018

Statistics


Number of views
90 (3 by Unilu)
Number of downloads
0 (0 by Unilu)

Bibliography


Similar publications



Contact ORBilu