Vertaisarvioitu artikkeli konferenssijulkaisussa (A4)

Understanding software obfuscation and diversification as defensive measures for the cybersecurity of Internet of Things




Julkaisun tekijätRauti Sampsa, Laato Samuli

ToimittajaTung X. Bui

Konferenssin vakiintunut nimiHawaii International Conference on System Sciences

KustantajaIEEE Computer Society

Julkaisuvuosi2023

JournalProceedings of the Annual Hawaii International Conference on System Sciences

Kirjan nimi *Proceedings of the 56th Annual Hawaii International Conference on System Sciences

Tietokannassa oleva lehden nimiProceedings of the Annual Hawaii International Conference on System Sciences

Sarjan nimiProceedings of the Annual Hawaii International Conference on System Sciences

Aloitussivu6645

Lopetussivun numero6654

ISBN978-0-9981331-6-4

eISSN2572-6862

Verkko-osoitehttps://hdl.handle.net/10125/103438

Rinnakkaistallenteen osoitehttps://research.utu.fi/converis/portal/detail/Publication/179594661


Tiivistelmä

Internet of Things (IoT) has emerged as an umbrella term to describe connecting smart everyday objects (such as washing machines, toilets and sound systems), sensors and industrial machines to the internet. While IoT devices hold potential to greatly enhance quality of life through automating and optimizing mundane tasks, there are a great deal of security and privacy challenges. For this reason, practitioners and academics have explored various ways to enhance the multi-layered security of IoT devices. One of these methods is obfuscation, which has been successfully applied to make accessing devices more difficult for adversaries. In this study, we systematically processed the literature on applying obfuscation and diversification to improve IoT cybersecurity (81 articles) and clustered this research according the obfuscation target (code, data, interface, location, traffic). We then conducted a follow-up bibliometric review of the entire research profile of IoT cybersecurity (3,682 articles) to understand how these obfuscation and diversification approaches relate to the general cybersecurity landscape and solutions of IoT. We also derive a comprehensive list of benefits and shortcomings of enhancing IoT security through diversification, and present points of departure for future research.


Ladattava julkaisu

This is an electronic reprint of the original article.
This reprint may differ from the original in pagination and typographic detail. Please cite the original version.




Last updated on 2024-21-02 at 15:58