Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Pietro, Biondi"'
Attackers may attempt exploiting Internet of Things (IoT) devices to operate them unduly as well as to gather personal data of the legitimate device owners'. Vulnerability Assessment and Penetration Testing (VAPT) sessions help to verify the effectiv
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7ec53d6b99aefcac91d1fce6c0032174
http://arxiv.org/abs/2302.04900
http://arxiv.org/abs/2302.04900
The advanced and personalised experience that modern cars offer makes them more and more data-hungry. For example, the cabin preferences of the possible drivers must be recorded and associated to some identity, while such data could be exploited to d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6e0cbdf4b9113edd0d0deb7dde3403bd
https://hdl.handle.net/20.500.11769/546164
https://hdl.handle.net/20.500.11769/546164
Publikováno v:
2022 6th International Conference on System Reliability and Safety (ICSRS).
Publikováno v:
SSRN Electronic Journal.
Autor:
Pietro Biondi, Giampaolo Bella
Publikováno v:
Developments in Language Theory ISBN: 9783319986531
The Controller Area Network (CAN) is the most common protocol interconnecting the various control units of modern cars. Its vulnerabilities are somewhat known but we argue they are not yet fully explored -- although the protocol is obviously not secu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8b15388eade59f9b9c0fc04d4d54c7c0
http://arxiv.org/abs/2111.11732
http://arxiv.org/abs/2111.11732
Autor:
Pietro Biondi, Giampaolo Bella
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030262495
Università degli Studi di Catania-IRIS
Università degli Studi di Catania-IRIS
Printers are common devices whose networked use is vastly unsecured, perhaps due to an enrooted assumption that their services are somewhat negligible and, as such, unworthy of protection. This article develops structured arguments and conducts techn
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4fa9831e5091b9e00d3a8be240df26f4
http://arxiv.org/abs/2111.10645
http://arxiv.org/abs/2111.10645
Publikováno v:
FMEC
VoIP phones are early representatives as well as present enhancers of the IoT. This paper observes that they are still widely used in a traditional, unsecured configuration and demonstrates the Phonejack family of attacks: Phonejack 1 conjectures the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5aa053c434f2e654a24657fc066eb86a
http://arxiv.org/abs/2111.15468
http://arxiv.org/abs/2111.15468
Publikováno v:
2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
Modern cars technologies are evolving quickly. They collect a variety of personal data and treat it on behalf of the car manufacturer to improve the drivers' experience. The precise terms of such a treatment are stated within the privacy policies acc
Publikováno v:
Trust, Privacy and Security in Digital Business ISBN: 9783030865856
Modern cars are evolving in many ways. Technologies such as infotainment systems and companion mobile applications collect a variety of personal data from drivers to enhance the user experience. This paper investigates the extent to which car drivers
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d79194b27fb1c3a9a910b7aee6c437c9
https://doi.org/10.1007/978-3-030-86586-3_10
https://doi.org/10.1007/978-3-030-86586-3_10