Pablo Marcondes Fonseca | UFMG - The Federal University of Minas Gerais (original) (raw)

Papers by Pablo Marcondes Fonseca

Research paper thumbnail of Defending Code from the Internet of Things against Buffer Overflow

2014 Brazilian Symposium on Computer Networks and Distributed Systems, 2014

The Internet of Things (IoT) demands tailor-made security solutions. Today, there are a number of... more The Internet of Things (IoT) demands tailor-made security solutions. Today, there are a number of proposals able to meet IoT's demands in the context of attacks from outsiders. In the context of insiders, however, this does not hold true. Existing solutions to deal with this class of attacks not always take into consideration the IoT's idiosyncrasies and, therefore, they do not produce the best results. This work aims at coming up with tailor-made security schemes for thwarting attacks from insiders in the context of IoT systems. Our propose makes use of a pioneering solution to pinpoint vulnerabilities: we crosscheck data from communicating nodes. Our solution provides the same guarantees as traditional security mechanisms, but it is about 83% more efficient, according to the experiments that this article describes.

Research paper thumbnail of Siot–Defendendo a Internet das Coisas contra Exploits

The Internet of Things (IoT) demands tailor-made security solutions. Today, there are a number of... more The Internet of Things (IoT) demands tailor-made security solutions. Today, there are a number of proposals able to meet IoT's demands in the context of attacks from outsiders. In the context of insiders, however, this does not hold true. Existing solutions to deal with this class of attacks not always take into consideration the IoT's idiosyncrasies and, therefore, they do not produce the best results. This work aims at coming up with tailor-made security schemes for thwarting attacks from insiders in the context of IoT systems. Our solution, SIoT, makes use of a pioneering solution to pinpoint vulnerabilities: we crosscheck data from communicating nodes. SIoT provides the same guarantees as traditional security mechanisms, but it is about 83% more efficient, according to the experiments that this article describes.

Research paper thumbnail of Defending Internet of Things against Exploits

IEEE Latin America Transactions, 2015

ABSTRACT The Internet of Things (IoT) demands tailor-made security solutions. Today, there are a ... more ABSTRACT The Internet of Things (IoT) demands tailor-made security solutions. Today, there are a number of proposals able to meet IoT's demands in the context of attacks from outsiders. In the context of insiders, however, this does not hold true. Existing solutions to deal with this class of attacks not always take into consideration the IoT's idiosyncrasies and, therefore, they do not produce the best results. This work aims at coming up with tailor-made security schemes for thwarting attacks from insiders in the context of IoT systems. Our solution makes use of a pioneering solution to pinpoint vulnerabilities: we crosscheck data from communicating nodes. It provides the same guarantees as traditional security mechanisms, but it is about 83% more efficient, according to the experiments that this article describes.

Research paper thumbnail of Defending Code from the Internet of Things against Buffer Overflow

2014 Brazilian Symposium on Computer Networks and Distributed Systems, 2014

The Internet of Things (IoT) demands tailor-made security solutions. Today, there are a number of... more The Internet of Things (IoT) demands tailor-made security solutions. Today, there are a number of proposals able to meet IoT's demands in the context of attacks from outsiders. In the context of insiders, however, this does not hold true. Existing solutions to deal with this class of attacks not always take into consideration the IoT's idiosyncrasies and, therefore, they do not produce the best results. This work aims at coming up with tailor-made security schemes for thwarting attacks from insiders in the context of IoT systems. Our propose makes use of a pioneering solution to pinpoint vulnerabilities: we crosscheck data from communicating nodes. Our solution provides the same guarantees as traditional security mechanisms, but it is about 83% more efficient, according to the experiments that this article describes.

Research paper thumbnail of Siot–Defendendo a Internet das Coisas contra Exploits

The Internet of Things (IoT) demands tailor-made security solutions. Today, there are a number of... more The Internet of Things (IoT) demands tailor-made security solutions. Today, there are a number of proposals able to meet IoT's demands in the context of attacks from outsiders. In the context of insiders, however, this does not hold true. Existing solutions to deal with this class of attacks not always take into consideration the IoT's idiosyncrasies and, therefore, they do not produce the best results. This work aims at coming up with tailor-made security schemes for thwarting attacks from insiders in the context of IoT systems. Our solution, SIoT, makes use of a pioneering solution to pinpoint vulnerabilities: we crosscheck data from communicating nodes. SIoT provides the same guarantees as traditional security mechanisms, but it is about 83% more efficient, according to the experiments that this article describes.

Research paper thumbnail of Defending Internet of Things against Exploits

IEEE Latin America Transactions, 2015

ABSTRACT The Internet of Things (IoT) demands tailor-made security solutions. Today, there are a ... more ABSTRACT The Internet of Things (IoT) demands tailor-made security solutions. Today, there are a number of proposals able to meet IoT's demands in the context of attacks from outsiders. In the context of insiders, however, this does not hold true. Existing solutions to deal with this class of attacks not always take into consideration the IoT's idiosyncrasies and, therefore, they do not produce the best results. This work aims at coming up with tailor-made security schemes for thwarting attacks from insiders in the context of IoT systems. Our solution makes use of a pioneering solution to pinpoint vulnerabilities: we crosscheck data from communicating nodes. It provides the same guarantees as traditional security mechanisms, but it is about 83% more efficient, according to the experiments that this article describes.