![]() |
COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. | ![]() |
University of Cambridge > Talks.cam > Computer Laboratory Security Seminar > No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis
No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic AnalysisAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Kieron Turk. The Internet of things (IoT) is composed by a wide variety of software and hardware components that inherently contain vulnerabilities. Previous research has shown that it takes only a few minutes from the moment an IoT device is connected to the Internet to the first infection attempts. Still, we know little about the evolution of exploit vectors. In this talk, we will be discussing which vulnerabilities are being targeted in the wild, how has the functionality changed over time, and for how long are vulnerabilities being targeted? Understanding these questions can help in the secure development, and deployment of IoT networks. This talk is part of the Computer Laboratory Security Seminar series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsBiological Anthropology Lent Term Seminars 2011 Chemical Engineering and Biotechnology occasional seminars King's Sustainability SeriesOther talksDeciphering the regulation and regulatory function of oncogenic transcription factors using time-resolved functional genetics Utopian Ambitions in the High Arctic at Resolute Bay Discussion Session Discussion Session Dr Deborah Vickers Mini course: Spectral Theory on the Fractals: Lecture 1 - Fractal lattices. The Sierpinski lattice as a typical example. Random walks on these lattices. |