Threats hidden in employee workstation through office files

Tung Lin Lee, I-Hsien Liu, Jung Shian Li

Research output: Contribution to journalConference articlepeer-review

Abstract

With the advent of the Internet of Things era, IoT devices participate in our work environment. From printers, shared files to temperature control, they make our working environment more convenient. Although these IoT devices communicate through different communication protocols, the same identity verification method is often used., hackers can also use this authentication method to steal user identity verification information, This study combines past research results to present our new findings, and further, organize them into a complete attack architecture.

Original languageEnglish
Pages (from-to)425-428
Number of pages4
JournalProceedings of International Conference on Artificial Life and Robotics
Volume2021
Publication statusPublished - 2021
Event26th International Conference on Artificial Life and Robotics, ICAROB 2021 - Beppu, Oita, Japan
Duration: 2021 Jan 212021 Jan 24

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Vision and Pattern Recognition
  • Hardware and Architecture
  • Information Systems
  • Control and Systems Engineering
  • Electrical and Electronic Engineering
  • Modelling and Simulation

Fingerprint

Dive into the research topics of 'Threats hidden in employee workstation through office files'. Together they form a unique fingerprint.

Cite this