ADIoT 2021
Date: Oct 04, 2021 8:00 am – Oct 08, 2021 4:00 pm
Location: Virtual
"The Internet of Things (IoT) technology is widely adopted by the vast majority of businesses and is impacting every aspect of the world. However, the natures of the Internet, communication, embedded OS and backend recourses make IoT objects vulnerable to cyber attacks. In addition, most standard security solutions designed for enterprise systems are not applicable to IoT devices. As a result, we are facing a big IoT security and protection challenge, and it is urgent to analyze IoT-specific cyber attacks to design novel and efficient security mechanisms.
This workshop will focus on IoT attacks and defenses, and seek original submissions that discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms. Topics of interest include, but are not limited to the ones listed below.
- Malware and unwanted software for IoT
- Vulnerability analysis and reverse engineering for IoT
- IoT security and privacy
- IoT forensic techniques
- Usable security and privacy for IoT
- Intrusion detection and prevention for IoT
- Cyber intelligence techniques for IoT
- IoT infrastructures and mitigation techniques
- IoT Hardware security
- Cyber physical systems security
- Adversarial learning for IoT
- IoT Cyber crime
- Denial-of-Service attacks for IoT
- Security measurement for IoT
- IoT security visualization techniques
- Edge/Fog computing attack and defense"
Submitted by Adam Ekwall
on
"The Internet of Things (IoT) technology is widely adopted by the vast majority of businesses and is impacting every aspect of the world. However, the natures of the Internet, communication, embedded OS and backend recourses make IoT objects vulnerable to cyber attacks. In addition, most standard security solutions designed for enterprise systems are not applicable to IoT devices. As a result, we are facing a big IoT security and protection challenge, and it is urgent to analyze IoT-specific cyber attacks to design novel and efficient security mechanisms.
This workshop will focus on IoT attacks and defenses, and seek original submissions that discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms. Topics of interest include, but are not limited to the ones listed below.
- Malware and unwanted software for IoT
- Vulnerability analysis and reverse engineering for IoT
- IoT security and privacy
- IoT forensic techniques
- Usable security and privacy for IoT
- Intrusion detection and prevention for IoT
- Cyber intelligence techniques for IoT
- IoT infrastructures and mitigation techniques
- IoT Hardware security
- Cyber physical systems security
- Adversarial learning for IoT
- IoT Cyber crime
- Denial-of-Service attacks for IoT
- Security measurement for IoT
- IoT security visualization techniques
- Edge/Fog computing attack and defense"