Study of Vulnerability Diagnosis and Sustaining Integrity of the Embedded Devices
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 11, Issue 2
Abstract
Security vulnerability of the embedded devices with Internet connectivity is frequently reported these days. In this paper, a diagnosis was made for a security vulnerability in the controller that is an element of the security system installed in homes and offices and connected to the Internet. The results showed a part of the functions of the controller may be suspended and the integrity of the security system may be lost due to an attack of known malware. In the latter part of this paper, the possible impacts on the controller and the security system were predicted based on the attack scenario on the security system initiated by the attack on the controller. It was also discussed what requirements must be fulfilled by the controller and the security system and about the need for a diagnosis for an unknown vulnerability.
Authors and Affiliations
Masaki Fujikawa
Artificial Neural Network Based Method for Classification of Gene Expression Data of Human Diseases along with Privacy Preserving
In this paper, the author introduces a classification approach using Artificial Neural Network(ANN) with Back-Propagation learning technique for human diseases like Cancer and heart problems from clinical diagnosis dat...
Modeling and implementation of sequencing of tasks to Maximize the Processing in an organization
The main objective of this work is to conceive a practical approach to improve customer’s satisfaction which is generally considered as the pillar of the development of customer fidelity for the company. It is necessar...
Time Effective Vehicle Booking: A Novel Data Online Cluster Search Recommender System
In mundane life of everyone, people are tending towards extracting some external knowledge provided by recommendations so as to get decisive about an artifact of interest. Recommender systems or sometimes also called as...
Simulation and Analysis of MC-CDMA System under AWGN and Rayleigh Fading Channel
This paper presents a detailed analysis of Multicarrier Code Division Multiple Access (MC-CDMA) system over Additive White Gaussian Noise (AWGN) and Rayleigh Fading Channel with analysisof the effects of different number...
A Novel Chaos-Based Stream Cipher for Image Encryption
In this paper, we introduce a novel chaos-based image encryption scheme. We perform our scheme using both the binary form and decimal form of chaotic maps. We also use two chaotic maps; one generates the initial values o...