Publication: Moving Target Defense Strategy Selection against Malware in Resource-Constrained Devices
Moving Target Defense Strategy Selection against Malware in Resource-Constrained Devices
Date
Date
Date
Citations
Von der Assen, J., Celdran, A. H., Huber, N., Bovet, G., Pérez, G. M., & Stiller, B. (2023). Moving Target Defense Strategy Selection against Malware in Resource-Constrained Devices. Proceedings of the IEEE International Conference on Cyber Security and Resilience, 123–129. https://doi.org/10.1109/csr57506.2023.10224824
Abstract
Abstract
Abstract
Internet-of-Things (IoT) devices have become critical assets to be protected due to increased adoption for emerging use cases. As such, these devices are confronted with a myriad of malware-based threats. To combat malware in IoT, Moving Target Defense (MTD) is a viable defense layer, since MTD does not rely on a low breach probability - aiming to increase security in a dynamic way. Although evidence supports the usefulness of MTD for IoT, the current state of the art suffers from unrealistic deployments, including the problem of oper
Additional indexing
Creators (Authors)
Event Title
Event Title
Event Title
Event Location
Event Location
Event Location
Event Country
Event Country
Event Country
Event Start Date
Event Start Date
Event Start Date
Event End Date
Event End Date
Event End Date
Page range/Item number
Page range/Item number
Page range/Item number
Page end
Page end
Page end
Item Type
Item Type
Item Type
In collections
Dewey Decimal Classifikation
Dewey Decimal Classifikation
Dewey Decimal Classifikation
Scope
Scope
Scope
Language
Language
Language
Date available
Date available
Date available
Series Name
Series Name
Series Name
ISBN or e-ISBN
ISBN or e-ISBN
ISBN or e-ISBN
OA Status
OA Status
OA Status
Free Access at
Free Access at
Free Access at
Publisher DOI
Citations
Von der Assen, J., Celdran, A. H., Huber, N., Bovet, G., Pérez, G. M., & Stiller, B. (2023). Moving Target Defense Strategy Selection against Malware in Resource-Constrained Devices. Proceedings of the IEEE International Conference on Cyber Security and Resilience, 123–129. https://doi.org/10.1109/csr57506.2023.10224824