Search results for "Security"

showing 10 items of 1693 documents

HALE-IoT: HArdening LEgacy Internet-of-Things devices by retrofitting defensive firmware modifications and implants

2022

Internet-Of-Things (IoT) devices and their firmware are notorious for their lifelong vulnerabilities. As device infection increases, vendors also fail to release patches at a competitive pace. Despite security in IoT being an active area of research, prior work has mainly focused on vulnerability detection and exploitation, threat modelling, and protocol security. However, these methods are ineffective in preventing attacks against legacy and End-Of-Life devices that are already vulnerable. Current research mainly focuses on implementing and demonstrating the potential of malicious modifications. Hardening emerges as an effective solution to provide IoT devices with an additional layer of d…

IoTfirmware modificationcybersecurityend-of-lifesuojausSSL-proxyHTTPSlegacyfirmwaredefensive techniquesWAFretrofit securityesineiden internettietoturvakyberturvallisuusEOLverkkohyökkäyksetdeviceshaavoittuvuus
researchProduct

Protection against reverse engineering in ARM

2020

With the advent of the mobile industry, we face new security challenges. ARM architecture is deployed in most mobile phones, homeland security, IoT, autonomous cars and other industries, providing a hypervisor API (via virtualization extension technology). To research the applicability of this virtualization technology for security in this platform is an interesting endeavor. The hypervisor API is an addition available for some ARMv7-a and is available with any ARMv8-a processor. Some ARM platforms also offer TrustZone, which is a separate exception level designed for trusted computing. However, TrustZone may not be available to engineers as some vendors lock it. We present a method of appl…

IoTmobiililaitteetARMtakaisinmallinnusesineiden internetsecuritymobilelangaton tekniikkahypervisortietoturvamikroprosessorit
researchProduct

Capturing citizens — Emerging needs: Using social networks in smart cities

2017

In order to reach its objectives, smart cities (or whatever kind of smart urban environment) should be underpinned by complex cyber physical systems (CPS) able to discover needs and services and "smartly" combine them. Services may be thought as services offered by software components, of whatever nature, for instance software, bot, robot, app and so on. Searching for the best service depends on the need of the citizen(s) and also on the type of (smart) environment the citizens are in. Analysis and design of CPSs are more challenging than the only physical or the only cyber system. We propose a design paradigm shift towards runtime for identifying requirements of cyber physical systems for …

IoTrequirements analysisService (systems architecture)021103 operations researchcyber physical systemComputer sciencebusiness.industry0211 other engineering and technologiesCyber-physical system020207 software engineering02 engineering and technologyComputer securitycomputer.software_genreSmart citieSoftwareComponent-based software engineering0202 electrical engineering electronic engineering information engineeringRobotSoftware systembusinesscomputerDesign paradigmRequirements analysis2017 AEIT International Annual Conference
researchProduct

Security Controls for Smart Buildings with Shared Space

2022

In this paper we consider cyber security requirements of the smart buildings. We identify cyber risks, threats, attack scenarios, security objectives and related security controls. The work was done as a part of a smart building design and construction work. From the controls identified w e concluded security practices for engineering-in smart buildings security. The paper provides an idea toward which system security engineers can strive in the basic design and implementation of the most critical components of the smart buildings. The intent of the concept is to help practitioners to avoid ad hoc approaches in the development of security mechanisms for smart buildings with shared space. pe…

IoTturvallisuussuunnitteluälytalotrakennusautomaatiosmart buildingesineiden internetsecurity riskskyberturvallisuushaavoittuvuussecurity controls2022 6th International Conference on Smart Grid and Smart Cities (ICSGSC)
researchProduct

The continuous sample of working lives: Improving its representativeness

2017

This paper studies the representativeness of the Continuous Sample of Working Lives (CSWL), a set of anonymized microdata containing information on individuals from Spanish Social Security records. We examine several CSWL waves (2005–2013) and show that it is not representative for the population with a pension income. We then develop a methodology to draw a large dataset from the CSWL that is much more representative of the retired population in terms of pension type, gender and age. This procedure also makes it possible for users to choose between goodness of fit and subsample size. In order to illustrate the practical significance of our methodology, the paper also contains an applicatio…

J26Subsample selectionComputer scienceChi-square testContinuous Sample of Working LivesPopulationMicrodata (statistics)Sample (statistics)p valueRepresentativeness heuristicPensionsGoodness of fit0502 economics and businessEconometricsddc:330050207 economicsH55education050205 econometrics education.field_of_studyPensionPublic pension system05 social sciencesStratified samplingStratified samplingSocial securityC81General Economics Econometrics and Finance
researchProduct

Securing Peace : article 9 and security policy under Koizumi Junichiro and Abe Shinzo

2016

Tarkastelen maisterintutkielmassani Japanin perustuslain sodan ja sotajoukkojen kieltävää 9. pykälää sekä Japanin turvallisuuspolitiikkaa kahden japanilaisen pääministerin, Koizumi Junichiron ja Abe Shinzon, puheissa. Tutkimuksen tehtävänä on selvittää, miten Koizumi ja Abe perustelevat 9. pykälän tulkinnan ja turvallisuuspolitiikan muutoksia heidän kausillaan sekä verrata tästä syntyviä tuloksia. Tutkimukseni monipuoliseen teoreettiseen viitekehykseen kuuluvat turvallisuus, kansainvälinen yhteisö, utopia ja realismi, rauha sekä retoriikka. Aineiston muodostaa rajattu määrä Koizumin ja Aben puheita, jotka olen valinnut käytyäni puheita läpi laajemmin. Tutkimuksen tulokset osoittavat, että J…

Japansecurity policyJapaniperustuslaitperustuslakiturvallisuuspolitiikkaconstitution
researchProduct

Lua Code: Security Overview and Practical Approaches to Static Analysis

2017

Lua is an interpreted, cross-platform, embeddable, performant and low-footprint language. Lua's popularity is on the rise in the last couple of years. Simple design and efficient usage of resources combined with its performance make it attractive for production web applications even to big organizations such as Wikipedia, CloudFlare and GitHub. In addition to this, Lua is one of the preferred choices for programming embedded and IoT devices. This context allows to assume a large and growing Lua codebase yet to be assessed. This growing Lua codebase could be potentially driving production servers and extremely large number of devices, some perhaps with mission-critical function for example i…

JavaComputer sciencevulnerabilityStatic program analysis02 engineering and technologyLuaJavaScriptSecurity testingohjelmointikielet020204 information systemsprogramming languages0202 electrical engineering electronic engineering information engineeringWeb applicationtietoturvadata securityhaavoittuvuuscomputer.programming_languageCodebaseta113business.industryComputingMilieux_PERSONALCOMPUTING020207 software engineeringPython (programming language)Static analysisAbstract syntax treeSoftware engineeringbusinesscomputer
researchProduct

Over-education and job satisfaction: The role of job insecurity and career enhancing strategies

2021

Abstract Introduction Over-education is a current phenomenon, which hampers job satisfaction. Finding variables that moderates the deteriorating effect of over-education could be useful. Objective Present study analyses the relationship between over-education and intrinsic, extrinsic and social facets of job satisfaction, and the moderation role of career enhancing strategies and job insecurity. Method Sample was composed of 1362 participants 16–30 years-old that entered the job market in the previous five years, from the 2011 cohort of the Spanish Observatory for Labor Entry of Youth. Analyses were made using Process Macro. Results Results show that all direct relationships are significant…

Job insecurity0502 economics and business05 social sciencesSample (statistics)Job satisfaction050207 economicsPsychologyModerationJob marketSocial psychology050203 business & managementApplied PsychologyEuropean Review of Applied Psychology
researchProduct

Job insecurity, worries about the future, and somatic complaints in two economic and cultural contexts: A study in Spain and Austria.

2015

Job insecurityGeneral Medicinemedicine.diseaseGeneral Business Management and AccountingEducationJob securitymedicineAnxietyOccupational stressmedicine.symptomPsychologySomatizationSocial psychologyGeneral PsychologyApplied PsychologyInternational Journal of Stress Management
researchProduct

Outcomes of Job Insecurity Climate: The Role of Climate Strength

2012

The large majority of studies on job insecurity have focused upon the individual level. Recent research has also paid some attention to job insecurity at the level of the organisation, referred to as job insecurity climate. This research has shown negative relationships between job insecurity climate and employees' individual job attitudes. Nevertheless, in these studies no attention has been paid to organisational climate strength, in spite of the recommendations formulated in the literature on this topic. In response, this study aims to account for climate strength in the relationship between job insecurity and job attitudes. We hypothesise that climate strength is related to job satisfac…

Job insecuritymedia_common.quotation_subjectJob attitudeSample (statistics)Arts and Humanities (miscellaneous)Work (electrical)Job performancePerceptionDevelopmental and Educational PsychologySpiteJob satisfactionPsychologySocial psychologyApplied Psychologymedia_commonApplied Psychology
researchProduct