Calculate Document
Research on Security Threats Using VPN in Zero Trust Environments

Research on Security Threats Using VPN in Zero Trust Environments

Rose, S.: NIST Special Publication 800-207, Zero Trust Architecture (2020) Google Scholar   Department of D

Related articles

OpenWrt setup with NordVPN How to Check if Your VPN Port is Blocked and How to Unblock it Configuración de NAT en VPN Gateway Best Free VPN for Windows in Singapore PureVPN Review 2024: Can You Trust This Low Cost VPN?
  1. Rose, S.: NIST Special Publication 800-207, Zero Trust Architecture (2020)

    Google Scholar  

  2. Department of Defense (DoD): Zero Trust Reference Architecture (2022)

    Google Scholar  

  3. Kindervag, J.: Build security into your network’s DNA: the zero trust network architecture, pp. 1–26. Forrester Research Inc. (2010)

    Google Scholar  

  4. Sudakshina , M. , Khan , D.A. , Jain , S. : Cloud – base zero trust access control policy : an approach to support work – from – home drive by COVID-19 pandemic . New Gener . Comput .39, 599–622 (2021). https://doi.org/10.1007/s00354-021-00130-6

    Article 

    Google Scholar 

  5. Kerman , A. , Borchert , O. , Rose , S. , Tan , A. : implement a zero trust architecture . technical report , The MITRE Corporation ( 2020 )

    Google Scholar  

  6. Anil, G.: A zero trust security framework for granular insight on blind spot and comprehensive device protection in the enterprise of Internet of Things (E-IOT). BMS Institute of Technology (2021)

    Google Scholar  

  7. Uttecht, K.D.: Zero Trust (ZT) concepts for federal government architectures. Massachusetts Institute of Technology, Lexington, United States (2020)

    Google Scholar  

  8. CSA Singapore: The Singapore Cybersecurity Strategy 2021 (2021). https://www.csa.gov.sg/Tips-Resource/publications/2021/singapore-cybersecurity-strategy-2021

  9. CISA USA: Zero Trust Maturity Mode, Pre-decisional Draft (2021). https://www.cisa.gov/sites/default/files/publications/CISA%20Zero%20Trust%20Maturity%20Model_Draft.pdf

  10. Ward , R. , Beyer , B. : BeyondCorp : a new approach to enterprise security ( 2014 )

    Google Scholar  

  11. Hwang, M.J.: Microsoft zero trust network strategy and implementation plan. Microsoft Cyber Security Solutions Group (2020)

    Google Scholar  

  12. Zimmer, B.: Location independent security approach (LISA). USENIX Security (2018)

    Google Scholar  

  13. Wright, C., Cowan, C., Morris, J., Smalley, S., Kroah-Hartman, G.: Linux security module framework. In: Ottawa Linux Symposium, vol. 8032, pp. 6–16 (2002)

    Google Scholar  

  14. Kim, S.Y., Jeong, K.H., Hwang, Y.N., Nyang, D.H.: Abnormal behavior detection for zero trust security model using deep learning. In: Korea Information Processing Society Collection of Academic Papers, vol. 28, no. 1, pp. 132–135 (2021)

    Google Scholar  

  15. Sun , P. , et al . : hybrid firmware analysis for know mobile and IoT security vulnerability . In : 2020 50th Annual IEEE / IFIP International Conference on Dependable Systems and Networks ( DSN ) . IEEE ( 2020 )

    Google Scholar  

  16. Rastogi, A., Nygard, K.E.: Software engineering principles and security vulnerabilities. In: CATA, pp. 180–190 (2019)

    Google Scholar  

  17. Corteggiani, N., Camurati, G., Francillon, A.: Inception: system-wide security testing of real-world embedded systems software. In: Proceedings of the USENIX Security Symposium (2018)

    Google Scholar  

  18. Chen, D.D., Egele, M., Woo, M., Brumley, D.: Towards automated dynamic analysis for Linux-based embedded firmware. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2016)

    Google Scholar  

  19. Costin , A. , Zarras , A. , Francillon , A. : automated dynamic firmware analysis at scale : a case study on embed web interface . In : proceeding of the ACM on Asia Conference on Computer and Communications Security ( ASIACCS ) ( 2016 )

    Google Scholar  

  20. Davidson , D. , Moench , B. , Ristenpart , T. , Jha , S. : FIE on firmware : find vulnerability in embed system using symbolic execution . In : proceeding of the USENIX Security Symposium ( 2013 )

    Google Scholar  

  21. Abeni, L., Kiraly, C.: Investigating the network performance of a real-time Linux Kernel. In: Proceedings of the 15th Real Time Linux Workshop (2013)

    Google Scholar