DocumentCode
123808
Title
Defending Code from the Internet of Things against Buffer Overflow
Author
Teixeira, Fernando A. ; Machado, Gustavo V. ; Fonseca, Pablo M. ; Pereira, Fernando M. Q. ; Hao Chi Wong ; Nogueira, Jose M. S. ; Oliveira, Leonardo B.
Author_Institution
Comput. Sci. Dept., Univ. Fed. de Minas GeraisMinas Gerais, Belo Horizonte, Brazil
fYear
2014
fDate
5-9 May 2014
Firstpage
293
Lastpage
301
Abstract
The Internet of Things (IoT) demands tailor-made security solutions. Today, there are a number of proposals able to meet IoT´s demands in the context of attacks from outsiders. In the context of insiders, however, this does not hold true. Existing solutions to deal with this class of attacks not always take into consideration the IoT´s idiosyncrasies and, therefore, they do not produce the best results. This work aims at coming up with tailor-made security schemes for thwarting attacks from insiders in the context of IoT systems. Our propose makes use of a pioneering solution to pinpoint vulnerabilities: we crosscheck data from communicating nodes. Our solution provides the same guarantees as traditional security mechanisms, but it is about 83% more efficient, according to the experiments that this article describes.
Keywords
Internet of Things; security of data; Internet of things; IoT idiosyncrasies; IoT systems; buffer overflow; code defense; communicating nodes; security mechanisms; tailor-made security solutions; Context; Electronic mail; Internet of Things; Java; Security; TV; Buffer Overflow; Code Security; Internet of Things;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Networks and Distributed Systems (SBRC), 2014 Brazilian Symposium on
Conference_Location
Florianopolis
Type
conf
DOI
10.1109/SBRC.2014.35
Filename
6927147
Link To Document