The security problems arising from the flawed design of legacy hardware and embedded devices allow cyber-criminals to easily compromise systems and launch large-scale attacks toward critical cyber-infrastructures. The interdisciplinary approach proposed in this chapter captures different phases of such emerging attacks, before and after known or unknown (zero-day) vulnerabilities have been widely exploited by cyber-criminals to launch the attack. Emphasis is given on building a proactive cyber-threat intelligence gathering and sharing system to prevent the exploitation of vulnerabilities and design flaws found in IoT devices. This intelligence information is used to maintain accurate vulnerability profiles of IoT devices, in accordance with data protection, privacy, or other regulations, and optimally alter their attack surface to minimize the damage from cyber-attacks.
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
Tel.: +1 703 830 6300
Fax: +1 703 830 2300 email@example.com
(Corporate matters and books only) IOS Press c/o Accucoms US, Inc.
For North America Sales and Customer Service
West Point Commons
Lansdale PA 19446
Tel.: +1 866 855 8967
Fax: +1 215 660 5042 firstname.lastname@example.org