**Author details**

Charles J. Gillan and George Karakonstantis\* The School of Electrical and Electronic Engineering and Computer Science (EEECS), Queen's University Belfast, Northern Ireland

\*Address all correspondence to: g.karakonstantis@qub.ac.uk

© 2020 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/ by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

**73**

*Security at the Edge*

2017;**21**(2):34-42

[3] Mukherjee M, Matam R, Shu L, Maglaras L, Ferrag MA, Choudhury N, et al. Security and privacy in fog computing: Challenges. IEEE Access. 2017;**5**:19293-19304

[4] Cabric M. Corporate Security Management. Challenges, Risks, and Strategies. 1st edition. London: Butterworth-Heinemann; 2015:242.

[5] S Institute. Operating System Security and Secure Operating Systems [Online]. Available from: https://www. giac.org/paper/gsec/2776/operatingsystem-security-secure-operatingsystems/104723 [Accessed: December

[6] IBM. Business Intelligence Architecture and Deployment Guide—Securing the Operating System [Online]. Available from: https://www.ibm.com/support/ knowledgecenter/en/SSEP7J\_10.2.1/com. ibm.swg.ba.cognos.crn\_arch.10.2.1.doc/c\_ securing\_the\_operating\_system.html

[Accessed: December 2017]

Security. 2009. pp. 545-554

[7] Wang Z, Jiang X, Cui W, Ning P. Countering kernel rootkits with lightweight hook protection. In:

Proceedings of the 16th ACM Conference on Computer and Communications

[8] Friedl S. An Illustrated Guide to the Kaminsky DNS Vulnerability [Online].

ISBN: 9780128029343

2017]

**References**

*DOI: http://dx.doi.org/10.5772/intechopen.92788*

Available from: http://unixwiz.net/ techtips/iguide-kaminsky-dns-vuln. html [Accessed: December 2017]

[9] Kocher P. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Advances in Cryptology (CRYPTO '96). Lecture Notes in Computer Science. Vol. 1109. Heidelberg, Berlin: Springer; 1996.

[10] Aly H, ElGayyar M. Attacking AES using Bernstein's attack on modern processors. In: Youssef A, Nitaj A, Hassanien AE, editors. Progress in Cryptology – AFRICACRYPT 2013. Vol. 7918. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer;

[11] Page D. Theoretical use of cache memory as a cryptanalytic side-channel. IACR Cryptology ePrint Archive.

[12] Tsunoo Y, Saito T, Suzaki T,

[13] Tromer E, Osvik D, Shamir A. Efficient cache attacks on AES, and countermeasures. Journal of Cryptology.

[14] Kocher P, Jaffe J, Jun B. Differential power analysis method and apparatus.

[15] Cryptocoding.net. Cryptographic Coding Standards. Available from: https://cryptocoding.net/index.php/ Cryptography\_Coding\_Standard; 2013

Cryptography library. Available from:

Shigeri M, Miyauci H. Cryptanalysis of DES implemented on computers with cache. Cryptographic Hardware and Embedded Systems-CHES. 2003;**2003**

pp. 104-113

2013. pp. 127-139

2010;**23**(1):37-71

U.S. Patent 7587044; 2009

[16] NaCl: Networking and

[17] Tsunoo Y, Saito T, Suzaki T, Shigeri M, Miyauchi H. Cryptanalysis

https://nacl.cr.yp.to/

2002:1-23

[1] Stojmenovic I, Wen S. The fog computing paradigm: Scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems (FedCSIS). Warsaw, Poland: IEEE; 2014. pp. 1-8

[2] Alrawais A, Alhothaily A, Hu C, Cheng X. Fog computing for the internet of things: Security and privacy issues. IEEE Internet Computing.
