Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …
significant attention from the research community. To this end, several surveys were put …
Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …
technologies and have wide range of applications in our surrounding environment. The …
A survey on IoT platforms: Communication, security, and privacy perspectives
Abstract The Internet of Things (IoT) redefines the way how commodity and industrial tasks
are performed every day. The integration of sensors, lightweight computation, and the …
are performed every day. The integration of sensors, lightweight computation, and the …
[PDF][PDF] IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
With more IoT devices entering the consumer market, it becomes imperative to detect their
security vulnerabilities before an attacker does. Existing binary analysis based approaches …
security vulnerabilities before an attacker does. Existing binary analysis based approaches …
Rethinking access control and authentication for the home internet of things ({{{{{IoT}}}}})
Computing is transitioning from single-user devices to the Internet of Things (IoT), in which
multiple users with complex social relationships interact with a single device. Currently …
multiple users with complex social relationships interact with a single device. Currently …
State-of-the-art survey of artificial intelligent techniques for IoT security
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …
innovation community's considerable attention. Several surveys have covered different IoT …
IoT vulnerability assessment for sustainable computing: threats, current solutions, and open challenges
Over the last few decades, sustainable computing has been widely used in areas like social
computing, artificial intelligence-based agent systems, mobile computing, and Internet of …
computing, artificial intelligence-based agent systems, mobile computing, and Internet of …
Security analysis of IoT devices by using mobile computing: a systematic literature review
Internet of Things (IoT) devices are operating in various domains like healthcare
environment, smart cities, smart homes, transportation, and smart grid system. These …
environment, smart cities, smart homes, transportation, and smart grid system. These …
Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities
Recent advances in Internet of Things (IoT) have enabled myriad domains such as smart
homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive …
homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive …
Karonte: Detecting insecure multi-binary interactions in embedded firmware
Low-power, single-purpose embedded devices (eg, routers and IoT devices) have become
ubiquitous. While they automate and simplify many aspects of users' lives, recent large-scale …
ubiquitous. While they automate and simplify many aspects of users' lives, recent large-scale …