Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations

N Neshenko, E Bou-Harb, J Crichigno… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …

Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …

A survey on IoT platforms: Communication, security, and privacy perspectives

L Babun, K Denney, ZB Celik, P McDaniel… - Computer Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) redefines the way how commodity and industrial tasks
are performed every day. The integration of sensors, lightweight computation, and the …

[PDF][PDF] IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.

J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang… - NDSS, 2018 - staff.ie.cuhk.edu.hk
With more IoT devices entering the consumer market, it becomes imperative to detect their
security vulnerabilities before an attacker does. Existing binary analysis based approaches …

Rethinking access control and authentication for the home internet of things ({{{{{IoT}}}}})

W He, M Golla, R Padhi, J Ofek, M Dürmuth… - 27th USENIX Security …, 2018 - usenix.org
Computing is transitioning from single-user devices to the Internet of Things (IoT), in which
multiple users with complex social relationships interact with a single device. Currently …

State-of-the-art survey of artificial intelligent techniques for IoT security

TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022 - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …

IoT vulnerability assessment for sustainable computing: threats, current solutions, and open challenges

P Anand, Y Singh, A Selwal, M Alazab, S Tanwar… - IEEE …, 2020 - ieeexplore.ieee.org
Over the last few decades, sustainable computing has been widely used in areas like social
computing, artificial intelligence-based agent systems, mobile computing, and Internet of …

Security analysis of IoT devices by using mobile computing: a systematic literature review

B Liao, Y Ali, S Nazir, L He, HU Khan - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) devices are operating in various domains like healthcare
environment, smart cities, smart homes, transportation, and smart grid system. These …

Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities

ZB Celik, E Fernandes, E Pauley, G Tan… - ACM Computing …, 2019 - dl.acm.org
Recent advances in Internet of Things (IoT) have enabled myriad domains such as smart
homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive …

Karonte: Detecting insecure multi-binary interactions in embedded firmware

N Redini, A Machiry, R Wang… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Low-power, single-purpose embedded devices (eg, routers and IoT devices) have become
ubiquitous. While they automate and simplify many aspects of users' lives, recent large-scale …