Search results for "Security"
showing 10 items of 1693 documents
HALE-IoT: HArdening LEgacy Internet-of-Things devices by retrofitting defensive firmware modifications and implants
2022
Internet-Of-Things (IoT) devices and their firmware are notorious for their lifelong vulnerabilities. As device infection increases, vendors also fail to release patches at a competitive pace. Despite security in IoT being an active area of research, prior work has mainly focused on vulnerability detection and exploitation, threat modelling, and protocol security. However, these methods are ineffective in preventing attacks against legacy and End-Of-Life devices that are already vulnerable. Current research mainly focuses on implementing and demonstrating the potential of malicious modifications. Hardening emerges as an effective solution to provide IoT devices with an additional layer of d…
Protection against reverse engineering in ARM
2020
With the advent of the mobile industry, we face new security challenges. ARM architecture is deployed in most mobile phones, homeland security, IoT, autonomous cars and other industries, providing a hypervisor API (via virtualization extension technology). To research the applicability of this virtualization technology for security in this platform is an interesting endeavor. The hypervisor API is an addition available for some ARMv7-a and is available with any ARMv8-a processor. Some ARM platforms also offer TrustZone, which is a separate exception level designed for trusted computing. However, TrustZone may not be available to engineers as some vendors lock it. We present a method of appl…
Capturing citizens — Emerging needs: Using social networks in smart cities
2017
In order to reach its objectives, smart cities (or whatever kind of smart urban environment) should be underpinned by complex cyber physical systems (CPS) able to discover needs and services and "smartly" combine them. Services may be thought as services offered by software components, of whatever nature, for instance software, bot, robot, app and so on. Searching for the best service depends on the need of the citizen(s) and also on the type of (smart) environment the citizens are in. Analysis and design of CPSs are more challenging than the only physical or the only cyber system. We propose a design paradigm shift towards runtime for identifying requirements of cyber physical systems for …
Security Controls for Smart Buildings with Shared Space
2022
In this paper we consider cyber security requirements of the smart buildings. We identify cyber risks, threats, attack scenarios, security objectives and related security controls. The work was done as a part of a smart building design and construction work. From the controls identified w e concluded security practices for engineering-in smart buildings security. The paper provides an idea toward which system security engineers can strive in the basic design and implementation of the most critical components of the smart buildings. The intent of the concept is to help practitioners to avoid ad hoc approaches in the development of security mechanisms for smart buildings with shared space. pe…
The continuous sample of working lives: Improving its representativeness
2017
This paper studies the representativeness of the Continuous Sample of Working Lives (CSWL), a set of anonymized microdata containing information on individuals from Spanish Social Security records. We examine several CSWL waves (2005–2013) and show that it is not representative for the population with a pension income. We then develop a methodology to draw a large dataset from the CSWL that is much more representative of the retired population in terms of pension type, gender and age. This procedure also makes it possible for users to choose between goodness of fit and subsample size. In order to illustrate the practical significance of our methodology, the paper also contains an applicatio…
Securing Peace : article 9 and security policy under Koizumi Junichiro and Abe Shinzo
2016
Tarkastelen maisterintutkielmassani Japanin perustuslain sodan ja sotajoukkojen kieltävää 9. pykälää sekä Japanin turvallisuuspolitiikkaa kahden japanilaisen pääministerin, Koizumi Junichiron ja Abe Shinzon, puheissa. Tutkimuksen tehtävänä on selvittää, miten Koizumi ja Abe perustelevat 9. pykälän tulkinnan ja turvallisuuspolitiikan muutoksia heidän kausillaan sekä verrata tästä syntyviä tuloksia. Tutkimukseni monipuoliseen teoreettiseen viitekehykseen kuuluvat turvallisuus, kansainvälinen yhteisö, utopia ja realismi, rauha sekä retoriikka. Aineiston muodostaa rajattu määrä Koizumin ja Aben puheita, jotka olen valinnut käytyäni puheita läpi laajemmin. Tutkimuksen tulokset osoittavat, että J…
Lua Code: Security Overview and Practical Approaches to Static Analysis
2017
Lua is an interpreted, cross-platform, embeddable, performant and low-footprint language. Lua's popularity is on the rise in the last couple of years. Simple design and efficient usage of resources combined with its performance make it attractive for production web applications even to big organizations such as Wikipedia, CloudFlare and GitHub. In addition to this, Lua is one of the preferred choices for programming embedded and IoT devices. This context allows to assume a large and growing Lua codebase yet to be assessed. This growing Lua codebase could be potentially driving production servers and extremely large number of devices, some perhaps with mission-critical function for example i…
Over-education and job satisfaction: The role of job insecurity and career enhancing strategies
2021
Abstract Introduction Over-education is a current phenomenon, which hampers job satisfaction. Finding variables that moderates the deteriorating effect of over-education could be useful. Objective Present study analyses the relationship between over-education and intrinsic, extrinsic and social facets of job satisfaction, and the moderation role of career enhancing strategies and job insecurity. Method Sample was composed of 1362 participants 16–30 years-old that entered the job market in the previous five years, from the 2011 cohort of the Spanish Observatory for Labor Entry of Youth. Analyses were made using Process Macro. Results Results show that all direct relationships are significant…
Job insecurity, worries about the future, and somatic complaints in two economic and cultural contexts: A study in Spain and Austria.
2015
Outcomes of Job Insecurity Climate: The Role of Climate Strength
2012
The large majority of studies on job insecurity have focused upon the individual level. Recent research has also paid some attention to job insecurity at the level of the organisation, referred to as job insecurity climate. This research has shown negative relationships between job insecurity climate and employees' individual job attitudes. Nevertheless, in these studies no attention has been paid to organisational climate strength, in spite of the recommendations formulated in the literature on this topic. In response, this study aims to account for climate strength in the relationship between job insecurity and job attitudes. We hypothesise that climate strength is related to job satisfac…