IoT security: Graph-based vulnerability and risk assessment models

Organization
Cryptography Research Group
Abstract
IoT devices and systems are vulnerable to attacks due to their characteristics. There are various attack and vulnerability assessment studies in the literature to bring persistent and applicable solutions for security concerns in IoT. These studies provide different approaches in terms of network representation and solution techniques. The graph model is one of these representations and technical approaches. An attack graph model shows all possible attack path sequences from the source to the target. Therefore, graph-based models can offer systematic, formal, and strong directions to determine vulnerable points, and they can help to design defense mechanisms. In this seminar, the main goal is to give a literature review with a comparison of available models.
Graduation Theses defence year
2024-2025
Supervisor
Sedat Akleylek
Spoken language (s)
English
Requirements for candidates
Level
Masters
Keywords
#cybersecurity, #graph_theory, #risk_assessment, #vulnerability_analysis

Application of contact

 
Name
Sedat Akleylek
Phone
E-mail
sedat.akleylek@ut.ee