Extended functionality attacks on IoT devices: The case of smart lights
E Ronen, A Shamir - 2016 IEEE European Symposium on …, 2016 - ieeexplore.ieee.org
In this paper we consider the security aspects of Internet of Things (IoT) devices, which
bridge the physical and virtual worlds. We propose a new taxonomy of attacks, which …
bridge the physical and virtual worlds. We propose a new taxonomy of attacks, which …
An experimental analysis of security vulnerabilities in industrial IoT devices
X Jiang, M Lora, S Chattopadhyay - ACM Transactions on Internet …, 2020 - dl.acm.org
The revolutionary development of the Internet of Things has triggered a huge demand for
Internet of Things devices. They are extensively applied to various fields of social activities …
Internet of Things devices. They are extensively applied to various fields of social activities …
Cloak and dagger: from two permissions to complete control of the UI feedback loop
The effectiveness of the Android permission system fundamentally hinges on the user's
correct understanding of the capabilities of the permissions being granted. In this paper, we …
correct understanding of the capabilities of the permissions being granted. In this paper, we …
Internet of Things (IoT): Taxonomy of security attacks
The Internet of Things (IoT) comprises a complex network of smart devices, which frequently
exchange data through the Internet. Given the significant growth of IoT as a new …
exchange data through the Internet. Given the significant growth of IoT as a new …
IoT goes nuclear: Creating a ZigBee chain reaction
E Ronen, A Shamir, AO Weingarten… - 2017 IEEE Symposium …, 2017 - ieeexplore.ieee.org
Within the next few years, billions of IoT devices will densely populate our cities. In this
paper we describe a new type of threat in which adjacent IoT devices will infect each other …
paper we describe a new type of threat in which adjacent IoT devices will infect each other …
Vulnerability studies and security postures of IoT devices: A smart home case study
Internet-of-Things (IoT) technology has revolutionized our daily lives in many ways-whether
it is the way we conduct our day-to-day activities inside our home, or the way we control our …
it is the way we conduct our day-to-day activities inside our home, or the way we control our …
ThingPot: an interactive Internet-of-Things honeypot
M Wang, J Santillan, F Kuipers - arXiv preprint arXiv:1807.04114, 2018 - arxiv.org
The Mirai Distributed Denial-of-Service (DDoS) attack exploited security vulnerabilities of
Internet-of-Things (IoT) devices and thereby clearly signalled that attackers have IoT on their …
Internet-of-Things (IoT) devices and thereby clearly signalled that attackers have IoT on their …
Data exfiltration from Internet of Things devices: iOS devices as case studies
Increasingly, big data (including sensitive and commercial-in-confidence data) is being
accessible and stored on a range of Internet of Things (IoT) devices, such as our mobile …
accessible and stored on a range of Internet of Things (IoT) devices, such as our mobile …
Peek-a-boo: I see your smart home activities, even encrypted!
A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment
allow users to easily control the physical world around them and facilitate their living styles …
allow users to easily control the physical world around them and facilitate their living styles …
A systematic study of security issues in Internet-of-Things (IoT)
BVS Krishna, T Gnanasekaran - … Conference on I-SMAC (IoT in …, 2017 - ieeexplore.ieee.org
Internet of things (IoT), also referred to as the internet of objects, is a dynamic global
information network consisting of internet—connected objects. Wireless sensor networks …
information network consisting of internet—connected objects. Wireless sensor networks …