Security and Privacy in Internet of Things: Threats and Solutions
Dawn Song

Citation
Dawn Song. "Security and Privacy in Internet of Things: Threats and Solutions". Talk or presentation, 4, November, 2015.

Abstract
In this talk, we'll discuss some of our recent work in security and privacy in Internet of Things, including new threats and solutions. I will describe our recent results on new security analysis in smart locks and cyber physical systems. I will discuss our new solutions for security and privacy in Internet of Things, including program hardening, automatic anomaly and attack detection, and secure and privacy-preserving collaborative analytics.

Electronic downloads


Internal. This publication has been marked by the author for FORCES-only distribution, so electronic downloads are not available without logging in.
Citation formats  
  • HTML
    Dawn Song. <a
    href="http://www.cps-forces.org/pubs/92.html"
    ><i>Security and Privacy in Internet of Things:
    Threats and Solutions</i></a>, Talk or
    presentation,  4, November, 2015.
  • Plain text
    Dawn Song. "Security and Privacy in Internet of Things:
    Threats and Solutions". Talk or presentation,  4,
    November, 2015.
  • BibTeX
    @presentation{Song15_SecurityPrivacyInInternetOfThingsThreatsSolutions,
        author = {Dawn Song},
        title = {Security and Privacy in Internet of Things:
                  Threats and Solutions},
        day = {4},
        month = {November},
        year = {2015},
        abstract = {In this talk, we'll discuss some of our recent
                  work in security and privacy in Internet of
                  Things, including new threats and solutions. I
                  will describe our recent results on new security
                  analysis in smart locks and cyber physical
                  systems. I will discuss our new solutions for
                  security and privacy in Internet of Things,
                  including program hardening, automatic anomaly and
                  attack detection, and secure and
                  privacy-preserving collaborative analytics.},
        URL = {http://cps-forces.org/pubs/92.html}
    }
    

Posted by Carolyn Winter on 4 Nov 2015.
Groups: forces
For additional information, see the Publications FAQ or contact webmaster at cps-forces org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.