Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …
significant attention from the research community. To this end, several surveys were put …
State-of-the-art survey of artificial intelligent techniques for IoT security
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …
innovation community's considerable attention. Several surveys have covered different IoT …
Understanding the mirai botnet
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …
SoK: Quantifying cyber risk
This paper introduces a causal model inspired by structural equation modeling that explains
cyber risk outcomes in terms of latent factors measured using reflexive indicators. First, we …
cyber risk outcomes in terms of latent factors measured using reflexive indicators. First, we …
Network hygiene, incentives, and regulation: deployment of source address validation in the internet
The Spoofer project has collected data on the deployment and characteristics of IP source
address validation on the Internet since 2005. Data from the project comes from participants …
address validation on the Internet since 2005. Data from the project comes from participants …
An analysis of phishing blacklists: Google safe browsing, openphish, and phishtank
Blacklists play a vital role in protecting internet users against phishing attacks. The
effectiveness of blacklists depends on their size, scope, update speed and frequency, and …
effectiveness of blacklists depends on their size, scope, update speed and frequency, and …
You've got vulnerability: Exploring effective vulnerability notifications
Security researchers can send vulnerability notifications to take proactive measures in
securing systems at scale. However, the factors affecting a notification's efficacy have not …
securing systems at scale. However, the factors affecting a notification's efficacy have not …
Hey, you have a problem: On the feasibility of {Large-Scale} web vulnerability notification
Large-scale discovery of thousands of vulnerableWeb sites has become a frequent event,
thanks to recent advances in security research and the rise in maturity of Internet-wide …
thanks to recent advances in security research and the rise in maturity of Internet-wide …
Didn't You Hear Me?---Towards More Successful Web Vulnerability Notifications
After treating the notification of affected parties as mere side-notes in research, our
community has recently put more focus on how vulnerability disclosure can be conducted at …
community has recently put more focus on how vulnerability disclosure can be conducted at …
Exposed infrastructures: Discovery, attacks and remediation of insecure ics remote management devices
Geographically distributed infrastructures, such as buildings, dams, and solar power plants,
are commonly maintained via Internet-connected remote management devices. Previous …
are commonly maintained via Internet-connected remote management devices. Previous …