Combating Malware with Whitelisting in IoT-based Medical Devices

  title={Combating Malware with Whitelisting in IoT-based Medical Devices},
  author={Raghu Nallani and V. Naga},
  journal={International Journal of Computer Applications},
With the rapid advancements in the mobile, Internet and wireless technologies, the computing environment is seamlessly getting integrated into the physical world and being connected to the Internet leading to Internet of Things (IoT). In this environment, heterogeneous devices can communicate with one another, leading to innovative applications in healthcare. Malware in IoT environment possesses a great challenge due to interconnected and interoperated systems. Traditional signature based anti… Expand
4 Citations

Figures and Topics from this paper

A Study on IoT: Model, Communication Protocols, Security Hazards & Countermeasures
  • 1
Cyber Physical IoT Device Management Using a Lightweight Agent
  • Matthew Maloney, E. Reilly, Michael Siegel, Gregory Falco
  • Computer Science
  • 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
  • 2019
  • 2
  • Highly Influenced
  • PDF
Detection malicious Android application based on simple-Dalvik intermediate language
  • 2


Performance Measures of Behavior-Based Signatures: An Anti-malware Solution for Platforms with Limited Computing Resource
  • Kelly Hughes, Yanzhen Qu
  • Computer Science
  • 2014 Ninth International Conference on Availability, Reliability and Security
  • 2014
  • 2
A practical business security framework to combat malware threat
  • 8
Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats
  • 18
Increasing the security on non-networked ground support equipment: Analyzing the implementation of whitelisting protection
  • 1
A Malware Signature Extraction and Detection Method Applied to Mobile Networks
  • 20
A Framework for Malware Detection Using Combination Technique and Signature Generation
  • M. F. Zolkipli, A. Jantan
  • Computer Science
  • 2010 Second International Conference on Computer Research and Development
  • 2010
  • 30
Evading Virus Detection Using Code Obfuscation
  • 19
Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience
  • 306
  • PDF
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms
  • 39
  • PDF