Cited 40 time in
Design and implementation of the secure compiler and virtual machine for developing secure IoT services
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Lee, YangSun | - |
| dc.contributor.author | Jeong, Junho | - |
| dc.contributor.author | Son, Yunsik | - |
| dc.date.accessioned | 2024-08-08T01:02:03Z | - |
| dc.date.available | 2024-08-08T01:02:03Z | - |
| dc.date.issued | 2017-11 | - |
| dc.identifier.issn | 0167-739X | - |
| dc.identifier.issn | 1872-7115 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/14869 | - |
| dc.description.abstract | Recent years have seen the development of computing environments for loT (Internet of Things) services, which exchange large amounts of information using various heterogeneous devices that are always connected to networks. Since the data communication and services occur on a variety of devices, which not only include traditional computing environments and mobile devices such as smartphones, but also household appliances, embedded devices, and sensor nodes, the security requirements are becoming increasingly important at this point in time. Already, in the case of mobile applications, security has emerged as a new issue, as the dissemination and use of mobile applications have been rapidly expanding. This software, including loT services and mobile applications, is continuously exposed to malicious attacks by hackers, because it exchanges data in the open Internet environment. The security weaknesses of this software are the direct cause of software breaches causing serious economic loss. In recent years, the awareness that developing secure software is intrinsically the most effective way to eliminate the software vulnerability, rather than strengthening the security system of the external environment, has increased. Therefore, methodology based on the use of secure coding rules and checking tools is attracting attention to prevent software breaches in the coding stage to eliminate the above vulnerabilities. This paper proposes a compiler and a virtual machine with secure software concepts for developing secure and trustworthy services for loT environments. By using a compiler and virtual machine, we approach the problem in two stages: a prevention stage, in which the secure compiler removes the security weaknesses from the source code during the application development phase, and a monitoring stage, in which the secure virtual machine monitors abnormal behavior such as buffer overflow attacks or untrusted input data handling while applications are running. (C)2016 Elsevier B.V. All rights reserved. | - |
| dc.format.extent | 8 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | ELSEVIER | - |
| dc.title | Design and implementation of the secure compiler and virtual machine for developing secure IoT services | - |
| dc.type | Article | - |
| dc.publisher.location | 네델란드 | - |
| dc.identifier.doi | 10.1016/j.future.2016.03.014 | - |
| dc.identifier.scopusid | 2-s2.0-84964597300 | - |
| dc.identifier.wosid | 000407983100029 | - |
| dc.identifier.bibliographicCitation | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, v.76, pp 350 - 357 | - |
| dc.citation.title | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | - |
| dc.citation.volume | 76 | - |
| dc.citation.startPage | 350 | - |
| dc.citation.endPage | 357 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
| dc.subject.keywordAuthor | Secure software | - |
| dc.subject.keywordAuthor | loT services | - |
| dc.subject.keywordAuthor | S/W weakness | - |
| dc.subject.keywordAuthor | Program analysis | - |
| dc.subject.keywordAuthor | Compiler construction | - |
| dc.subject.keywordAuthor | Virtual machine | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
