REFERENCES
Badhwar, R.: Intro to API Security - Issues and Some
Solutions! the CISO’s next Frontier Pp. 239–244 (2021).
Https://Doi.Org/10.1007/978-3-030-75354-2_ 29
Iulia Bastys, Musard Balliu, and Andrei Sabelfeld. if This
then What? Controlling Flows in Iot Apps. in
Proceedings of the 2018 ACM SIGSAC Conference on
Computer and Communications Security (CCS '18),
Page 1102-1119, 2018.
Boniface, Michael, Carmichael, Laura, Hall, Wendy,
Mcmahon, James, Pickering, J. Brian, Surridge, Mike,
Taylor, Steve, Atmaca, Ugur Ilker, Epiphaniou, Gregory,
Maple, Carsten, Murakonda, Sasi, & Weller, Suzanne.
(2022). DARE UK Priam Project D3 Report: Privacy
Risk Framework Application Guide (1.1). Zenodo.
Https://Doi.Org/10.5281/Zenodo.7107466
Boyes, H., 2015. Cybersecurity and Cyber-Resilient Supply
Chains. Technology Innovation Management Review,
5(4), P.28.
Z. Berkay Celik, Gang Tan, and Patrick Mcdaniel. Iotguard:
Dynamic Enforcement of Security and Safety Policy in
Commodity Iot. in Proceedings of the 23rd Network and
Distributed System Security Symposium (NDSS '19),
San Diego, CA.
Clements et al., A. “Halucinator: Firmware Re-Hosting
through Abstraction Layer Emulation,” Presented at the
29
th
USENIX Security Symposium (USENIX Security
20), 2020, Pp. 1201–1218. Https://Www.Usenix.Org/
Conference/Usenixsecurity20/Presentation/Clements
Bazhaniuk, Oleksandr, Jesse Michael & Mickey Shkatov.
Driving down the Rabbit Hole. Def-Con 2017.
Https://Infocondb.Org/Con/Def-Con/Def-Con-
25/Driving-down-the-Rabbit-Hole.
Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel
Simionato, Mauro Conti, and Atul Prakash. Flowfence:
Practical Data Protection for Emerging IoT Application
Frameworks. in 25th USENIX Security Symposium
(USENIX Security '16), Pages 531-548, Austin, TX.
Fasano et al., A. “Sok: Enabling Security Analyses of
Embedded Systems via Rehosting,” in Proceedings of the
2021 ACM Asia Conference on Computer and
Communications Security, New York, NY, USA, Jun.
2021, Pp. 687–701. Doi: 10.1145/3433210.3453093.
Gustafson et al., E. “Toward the Analysis of Embedded
Firmware through Automated Re-Hosting,” Presented at
the 22nd International Symposium on Research in
Attacks, Intrusions and Defenses (RAID 2019), 2019,
Pp. 135–150. https://www.Usenix.Org/Conference/ Raid
2019/Presentation/Gustafson
C. Todd Lopez, (2020). Dod Adopts 5 Principles of Artificial
Intelligence Ethics, Department of Defense (Feb. 5,
2020), Available Online: Https://Www.Defense.Gov/
Explore/News/Article/Article/2094085/Dod-Adopts-5-
Principles-of-Artificial-Intelligence-Ethics/
Frans Lundberg, Juraj Feljan. Julia: Fast and Secure Key
Agreement for Iot Devices. in Proceedings of the 14th
ACM Conference on Security and Privacy in Wireless
and Mobile Networks (WISEC '21), Pages 90-99, 2021.
G. Mcgraw, "Software Security", Addison-Wesley 2006
Montecchi, M., Plangger, K., and Etter, M. (2019). It’s Real,
Trust Me! Establishing Supply Chain Provenance using
Blockchain. Business Horizons. 10.1016/ J.Bushor.201
9.01.008.
Parkinson, S., Khana, S. Identifying High-Risk over-
Entitlement in Access Control Policies using Fuzzy
Logic. Cybersecurity 5, 6 (2022). https://Doi.Org/10.1
186/S42400-022-00112-1
Trevor Perrin. the Noise Protocol Framework, Revision 34,
2018. Https://Noiseprotocol.Org/Noise.Html
Salunkhe, U.R., Mali, S.N.: Security Enrichment in Intrusion
Detection System using Classifier Ensemble. J. Electr.
Comput. Eng. (2017). Https ://Doi.Org/10.1155/20
17/17948 49
T. Scharnowski Et Al., “Fuzzware: using Precise {MMIO}
Modeling for Effective Firmware Fuzzing,” 31st
USENIX Security Symposium (USENIX Security 22),
2022, Pp. 1239–1256. https://www.Usenix.Org/
Conference/Usenixsecurity22/Presentation/Scharnowski
Surridge M. Et Al. (2019) Modelling Compliance Threats
and Security Analysis of Cross Border Health Data
Exchange. in: Attiogbé C., Ferrarotti F., Maabout S.
(Eds) New Trends in Model and Data Engineering.
MEDI 2019. Communications in Computer and
Information Science, Vol 1085. Springer, Cham.
Taylor, S., Surridge, M., and Pickering, B., "Regulatory
Compliance Modelling using Risk Management
Techniques," 2021 IEEE World AI Iot Congress (Aiiot),
2021, Pp. 0474-0481, Doi: 10.1109/Aiiot52608.20
21.9454188.
Yuan Tian, Nan Zhang, Yueh-Hsun Lin, Xiaofeng Wang,
Blase Ur, Xianzheng Guo, and Patrick Tague. Smartauth:
User-Centered Authorization for the Internet of Things.
in 26th USENIX Security Symposium (USENIX
Security '17), Pages 361-378.
Vengatesan, K., Kumar, a., Naik, R., Verma, D.K.: Anomaly
based Novel Intrusion Detection System for Network
Traffic Reduction. in: 2nd International Conference on I-
SMAC. Iot in Social, Mobile, Analytics and Cloud
(2019)
Ralf-Philipp Weinmann. 2012. Baseband Attacks: Remote
Exploitation of Memory Corruptions in Cellular Protocol
Stacks. in Proceedings of the 6th USENIX Conference
on Offensive Technologies (WOOT'12). USENIX
Association, USA.
Jos Wetzels: the RTOS Exploit Mitigation Blues,
Hardwear.Io 2017 Https://Hardwear.Io/Document/ Rtos-
Exploit-Mitigation-Blues-Hardwear-Io.Pdf
Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang, Amir
Rahmati, Earlence Fernandes, Z. Morley Mao, and Atul
Prakash. Contexiot: towards Providing Contextual
Integrity to Appified Iot Platforms. in Proceedings of the
21st Network and Distributed System Security
Symposium (NDSS'17), San Diego, CA.
L. Zhou, L. Wang, Y. Sun, P. Lv, Beekeeper: a Blockchain-
based Iot System with Secure Storage and Homomorphic
Computation, IEEE Access (2018).