SFO-CID: Structural Feature Optimization Based Command Injection Vulnerability Discovery for Internet of Things

X Chen, L Sha, J Wang, F **ao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The rapid development of Industrial Internet of Things (IIoT) has raised wider concerns for
security of IoT devices. Command injection (CI) vulnerabilities, prevalent in IoT devices …

Detection and Analysis of Broken Access Control Vulnerabilities in App-Cloud Interaction in IoT

Z Zhang, F Zou, J Hong, L Chen… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
At present, there is less research on the detection of broken access control vulnerabilities in
IoT systems, mostly using state machines to analyze abnormal state transitions, and no …

Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications

J Yang, C Liu, B Fang - Journal of Cloud Computing, 2024 - Springer
Coverage-guided fuzzing is one of the most popular approaches to detect bugs in programs.
Existing work has shown that coverage metrics are a crucial factor in guiding fuzzing …

Finding Taint-Style Vulnerabilities in Lua Application of IoT Firmware with Progressive Static Analysis

X Li, Q Wei, Z Wu, W Guo - Applied Sciences, 2023 - mdpi.com
With the rapid growth of IoT devices, ensuring the security of embedded firmware has
become a critical concern. Despite advances in existing vulnerability discovery methods …

MSLFuzzer: black-box fuzzing of SOHO router devices via message segment list inference

Y Cheng, W Fan, W Huang, J Yang, G Yu, W Liu - Cybersecurity, 2023 - Springer
The popularity of small office and home office routers has brought convenience, but it also
caused many security issues due to vulnerabilities. Black-box fuzzing through network …

Seum Spread: Discerning Security Flaws in IoT Firmware via Call Sequence Semantics

A Lounis, A Andreoli, M Debbabi, A Hanna - International Conference on …, 2024 - Springer
Abstract Internet-of-Things (IoT) devices play a central role in the modern digital landscape
by providing uninterrupted convenience, but their history has been marked by the …

Uncovering Hidden Risks in IoT devices: A Post-Pandemic National Study of SOHO Wi-Fi Router Security

O Freitas, F Taffarel, AL dos Santos… - Journal of Internet …, 2024 - journals-sol.sbc.org.br
This study thoroughly analyzes the cybersecurity status of Small Office/Home Office (SOHO)
Wi-Fi routers. These routers are crucial but frequently overlooked elements in network …

Check for Seum Spread: Discerning Security Flaws in IoT Firmware via Call Sequence Semantics Anis Lounis (), Anthony Andreoli, Mourad Debbabi, and Aiman …

A Lounis - Detection of Intrusions and Malware, and Vulnerability …, 2024 - books.google.com
Internet-of-Things (IoT) devices play a central role in the modern digital landscape by
providing uninterrupted convenience, but their history has been marked by the opportunities …

A fuzz testing technique based on determining valid fields

S Zhang, M Peng, Y **e - Third International Conference on …, 2024 - spiedigitallibrary.org
In the context of vulnerability discovery in Internet of Things (IoT) devices, fuzzing technology
has demonstrated better performance. However, under typical circumstances, fuzzing …

Análise de vulnerabilidades em larga escala nos Roteadores Wi-Fi por meio de Web-Fuzzing

F Taffarel, OB de Freitas, LAP Junior - Anais do XXIII Simpósio …, 2023 - sol.sbc.org.br
Os roteadores sem-fio progrediram para garantir a conectividade entre os dispositivos IoT à
Internet. Essa evolução também aumentou a importância de análises de segurança, devido …