Static analysis of information systems for IoT cyber security: a survey of machine learning approaches

I Kotenko, K Izrailov, M Buinevich - Sensors, 2022 - mdpi.com
Ensuring security for modern IoT systems requires the use of complex methods to analyze
their software. One of the most in-demand methods that has repeatedly been proven to be …

[HTML][HTML] Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review

S Madan, S Sofat, D Bansal - Journal of King Saud University-Computer …, 2022 - Elsevier
IoT devices which include wireless sensors, software, actuators, and computer devices
operated through the Internet, enable the transfer of data among objects or people …

A survey on security issues in IoT operating systems

P Sun, Y Wan, Z Wu, Z Fang - Journal of Network and Computer …, 2024 - Elsevier
The security issues of the core (operating systems) of the Internet of Things (IoT) are
becoming increasingly urgent and prominent, this article conducts a systematic research …

HADES-IoT: A practical and effective host-based anomaly detection system for IoT devices (extended version)

D Breitenbacher, I Homoliak, YL Aung… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices have become ubiquitous, with applications in many domains,
including industry, transportation, and healthcare; these devices also have many household …

SpiderScan: Practical Detection of Malicious NPM Packages Based on Graph-Based Behavior Modeling and Matching

Y Huang, R Wang, W Zheng, Z Zhou, S Wu… - Proceedings of the 39th …, 2024 - dl.acm.org
Open source software (OSS) supply chains have been attractive targets for attacks. One of
the significant, popular attacks is realized by malicious packages on package registries …

An Efficient Framework for Security of Internet‐of‐Things Devices against Malicious Software Updates

A Qureshi, J Shamsi, M Marvi - Journal of Computer Networks …, 2024 - Wiley Online Library
The advent of smart cities has revolutionized urban living by providing innovative solutions,
such as smart homes, smart hospitals, and smart parking. These smart applications have …

Understanding and detecting remote infection on linux-based IoT devices

H Li, Q Huang, F Ding, H Hu, L Cheng, G Gu… - … of the 2022 ACM on Asia …, 2022 - dl.acm.org
The rocketed population, poor security, and 24/7 online properties make Linux-based
Internet of Things (IoT) devices ideal targets for attackers. However, due to the budget …

Analyzing the Attack Pattern of Brute Force Attack on SSH Port

A Subhan, YN Kunang, IZ Yadi - … International Conference on …, 2023 - ieeexplore.ieee.org
Cyberattacks are one of the threats in the world of technology. Various kinds of cyberattacks
can be a threat to information security. One example of a cyberattack is a brute force attack …

Through the Looking Glass: LLM-Based Analysis of AR/VR Android Applications Privacy Policies

A Alghamdi, D Mohaisen - arxiv preprint arxiv:2501.19223, 2025 - arxiv.org
\begin {abstract} This paper comprehensively analyzes privacy policies in AR/VR
applications, leveraging BERT, a state-of-the-art text classification model, to evaluate the …

Toward Intelligent IoT Endpoint Detection and Response Using Digital Twins via Firmware Emulation

SM Cheng, YC Lui, NJ Tsai… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The properties of short time-to-market, heterogeneity, constrained resources, and unfriendly
interfaces for IoT endpoint devices render system-based security mechanisms in traditional …