Главная
Study mode:
on
1
Intro
2
Extinguishing the loT Insecurity Dumpster Fire
3
Overview of Prior Work
4
Evaluating Off The Shelf Devices
5
Evaluation Device
6
Scoring The Components
7
Evaluation Takeaways
Description:
Explore a comprehensive security evaluation of home-based IoT deployments in this 18-minute IEEE conference talk. Delve into the complex security challenges facing IoT devices, moving beyond surface-level integration issues to examine the underlying traditional compute systems. Learn about a proposed methodology for analyzing security properties of home-based IoT devices, and discover the results of a systematic literature review and evaluation of 45 devices. Gain insights into attack techniques, mitigations, and stakeholders in the IoT ecosystem. Access a public portal containing evaluation data and contribute to ongoing research in this critical area of cybersecurity.

SoK- Security Evaluation of Home Based IoT Deployment

IEEE
Add to list
0:00 / 0:00