[HTML][HTML] A systematic review of fault injection attacks on iot systems

A Gangolli, QH Mahmoud, A Azim - Electronics, 2022 - mdpi.com
The field of the Internet of Things (IoT) is growing at a breakneck pace and its applications
are becoming increasingly sophisticated with time. Fault injection attacks on IoT systems are …

A survey on IoT & embedded device firmware security: architecture, extraction techniques, and vulnerability analysis frameworks

S Ul Haq, Y Singh, A Sharma, R Gupta… - Discover Internet of Things, 2023 - Springer
IoT and Embedded devices grow at an exponential rate, however, without adequate security
mechanisms in place. One of the key challenges in the cyber world is the security of these …

Detecting vulnerability on IoT device firmware: A survey

X Feng, X Zhu, QL Han, W Zhou… - IEEE/CAA Journal of …, 2022 - ieeexplore.ieee.org
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …

Edge computing technology enablers: A systematic lecture study

S Douch, MR Abid, K Zine-Dine, D Bouzidi… - IEEE …, 2022 - ieeexplore.ieee.org
With the increasing stringent QoS constraints (eg, latency, bandwidth, jitter) imposed by
novel applications (eg, e-Health, autonomous vehicles, smart cities, etc.), as well as the …

Analysis of consumer IoT device vulnerability quantification frameworks

SA Baho, J Abawajy - Electronics, 2023 - mdpi.com
The increasing deployment of Internet of Things (IoT) devices in mission-critical systems has
made them more appealing to attackers. Cyberattacks on IoT devices have the potential to …

Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned

D Kim, E Kim, SK Cha, S Son… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Binary code similarity analysis (BCSA) is widely used for diverse security applications,
including plagiarism detection, software license violation detection, and vulnerability …

Air-fi: Leaking data from air-gapped computers using wi-fi frequencies

M Guri - IEEE Transactions on Dependable and Secure …, 2022 - ieeexplore.ieee.org
This article presents a new attack allowing attackers to exfiltrate data from isolated, air-
gapped computers via Wi-Fi frequencies. We show that malware in a compromised air …

Game of hide-and-seek: Exposing hidden interfaces in embedded web applications of iot devices

W **e, J Chen, Z Wang, C Feng, E Wang… - Proceedings of the …, 2022 - dl.acm.org
Recent years have seen increased attacks targeting embedded web applications of IoT
devices. An important target of such attacks is the hidden interface of embedded web …

Analysis of machine learning-based approaches for securing the Internet of Things in the smart industry: a multivocal state of knowledge review

R Reyes-Acosta, C Dominguez-Baez… - International Journal of …, 2025 - Springer
This study introduces the implementation of a Multivocal Literature Review (MLR) approach
to analyze machine learning (ML) and deep learning (DL) strategies for securing the …

Operation Mango: Scalable Discovery of {Taint-Style} Vulnerabilities in Binary Firmware Services

W Gibbs, AS Raj, JM Vadayath, HJ Tay… - 33rd USENIX Security …, 2024 - usenix.org
The rise of IoT (Internet of Things) devices has created a system of convenience, which
allows users to control and automate almost everything in their homes. But this increase in …