A systematic review on privacy-aware iot personal data stores
Data from the Internet of Things (IoT) enables the design of new business models and
services that improve user experience and satisfaction. These data serve as important …
services that improve user experience and satisfaction. These data serve as important …
Aot-attack on things: A security analysis of iot firmware updates
IoT devices implement firmware update mechanisms to fix security issues and deploy new
features. These mechanisms are often triggered and mediated by mobile companion apps …
features. These mechanisms are often triggered and mediated by mobile companion apps …
Iotflow: Inferring iot device behavior at scale through static mobile companion app analysis
The number of" smart''devices, that is, devices making up the Internet of Things (IoT), is
steadily growing. They suffer from vulnerabilities just as other software and hardware …
steadily growing. They suffer from vulnerabilities just as other software and hardware …
Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols
Internet-of-Things (IoT) devices, ranging from smart home assistants to health devices, are
pervasive: Forecasts estimate their number to reach 29 billion by 2030. Understanding the …
pervasive: Forecasts estimate their number to reach 29 billion by 2030. Understanding the …
From play to profession: a serious game to raise awareness on digital forensics
With the increasing digitization and interconnectivity of organizations, the frequency of
cyberattacks is rising. These attacks have serious consequences for data security and …
cyberattacks is rising. These attacks have serious consequences for data security and …
Unveiling {IoT} Security in Reality: A {Firmware-Centric} Journey
To study the security properties of the Internet of Things (IoT), firmware analysis is crucial. In
the past, many works have been focused on analyzing Linux-based firmware. Less known is …
the past, many works have been focused on analyzing Linux-based firmware. Less known is …
Assessing Security, Privacy, User Interaction, and Accessibility Features in Popular E-Payment Applications
Mobile payment applications facilitate quick digital transactions; thus, evaluating these
applications for security, privacy, user interaction, and accessibility is crucial. In our study …
applications for security, privacy, user interaction, and accessibility is crucial. In our study …
Dissecting Operational Cellular IoT Service Security: Attacks and Defenses
More than 150 cellular networks worldwide have rolled out LTE-M (LTE-Machine Type
Communication) and/or NB-IoT (Narrow Band Internet of Things) technologies to support …
Communication) and/or NB-IoT (Narrow Band Internet of Things) technologies to support …
IoT Mobile Applications Pentesting–Methodology and Results of Research
J Adamski, M Janiszewski… - IEEE Internet of Things …, 2025 - ieeexplore.ieee.org
The article describes the methodology of pentesting mobile applications used to control
Internet of Things devices, which is part of a comprehensive methodology for testing the …
Internet of Things devices, which is part of a comprehensive methodology for testing the …
Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites
The surge in website attacks, including Denial of Service (DoS), Cross-Site Scripting (XSS),
and Clickjacking, underscores the critical need for robust HTTPS implementation—a …
and Clickjacking, underscores the critical need for robust HTTPS implementation—a …