A systematic review on privacy-aware iot personal data stores

GP Pinto, PK Donta, S Dustdar, C Prazeres - Sensors, 2024 - mdpi.com
Data from the Internet of Things (IoT) enables the design of new business models and
services that improve user experience and satisfaction. These data serve as important …

Aot-attack on things: A security analysis of iot firmware updates

M Ibrahim, A Continella… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
IoT devices implement firmware update mechanisms to fix security issues and deploy new
features. These mechanisms are often triggered and mediated by mobile companion apps …

Iotflow: Inferring iot device behavior at scale through static mobile companion app analysis

D Schmidt, C Tagliaro, K Borgolte… - Proceedings of the 2023 …, 2023 - dl.acm.org
The number of" smart''devices, that is, devices making up the Internet of Things (IoT), is
steadily growing. They suffer from vulnerabilities just as other software and hardware …

Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols

C Tagliaro, M Komsic, A Continella, K Borgolte… - Proceedings of the 27th …, 2024 - dl.acm.org
Internet-of-Things (IoT) devices, ranging from smart home assistants to health devices, are
pervasive: Forecasts estimate their number to reach 29 billion by 2030. Understanding the …

From play to profession: a serious game to raise awareness on digital forensics

S Friedl, T Reittinger, G Pernul - IFIP Annual Conference on Data and …, 2024 - Springer
With the increasing digitization and interconnectivity of organizations, the frequency of
cyberattacks is rising. These attacks have serious consequences for data security and …

Unveiling {IoT} Security in Reality: A {Firmware-Centric} Journey

N Nino, R Lu, W Zhou, KH Lee, Z Zhao… - 33rd USENIX Security …, 2024 - usenix.org
To study the security properties of the Internet of Things (IoT), firmware analysis is crucial. In
the past, many works have been focused on analyzing Linux-based firmware. Less known is …

Assessing Security, Privacy, User Interaction, and Accessibility Features in Popular E-Payment Applications

U Kishnani, N Noah, S Das, R Dewri - Proceedings of the 2023 …, 2023 - dl.acm.org
Mobile payment applications facilitate quick digital transactions; thus, evaluating these
applications for security, privacy, user interaction, and accessibility is crucial. In our study …

Dissecting Operational Cellular IoT Service Security: Attacks and Defenses

S Wang, T **e, MY Chen, GH Tu, CY Li… - IEEE/ACM …, 2023 - ieeexplore.ieee.org
More than 150 cellular networks worldwide have rolled out LTE-M (LTE-Machine Type
Communication) and/or NB-IoT (Narrow Band Internet of Things) technologies to support …

IoT Mobile Applications Pentesting–Methodology and Results of Research

J Adamski, M Janiszewski… - IEEE Internet of Things …, 2025 - ieeexplore.ieee.org
The article describes the methodology of pentesting mobile applications used to control
Internet of Things devices, which is part of a comprehensive methodology for testing the …

Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites

U Kishnani, S Das - International Conference on Information Systems …, 2025 - Springer
The surge in website attacks, including Denial of Service (DoS), Cross-Site Scripting (XSS),
and Clickjacking, underscores the critical need for robust HTTPS implementation—a …