Detecting vulnerability on IoT device firmware: A survey
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …
introducing vulnerabilities and novel attacks that make many companies as primary targets …
Preventing mqtt vulnerabilities using iot-enabled intrusion detection system
The advancement in the domain of IoT accelerated the development of new communication
technologies such as the Message Queuing Telemetry Transport (MQTT) protocol. Although …
technologies such as the Message Queuing Telemetry Transport (MQTT) protocol. Although …
A systematic review of IoT systems testing: Objectives, approaches, tools, and challenges
Internet of Things (IoT) systems are becoming prevalent in various domains, from healthcare
to smart homes. Testing IoT systems is critical in ensuring their reliability. Previous papers …
to smart homes. Testing IoT systems is critical in ensuring their reliability. Previous papers …
Enhance the trust between IoT devices, mobile apps, and the cloud based on blockchain
The current IoT platform is vulnerable to remote device hijacking and substitution attacks,
primarily due to weak authentication and authorization mechanisms between IoT devices …
primarily due to weak authentication and authorization mechanisms between IoT devices …
Defect Categorization in Compilers: A Multi-vocal Literature Review
Context: Compilers are the fundamental tools for software development. Thus, compiler
defects can disrupt development productivity and propagate errors into developer-written …
defects can disrupt development productivity and propagate errors into developer-written …
Reflecting on recurring failures in iot development
D Anandayuvaraj, JC Davis - Proceedings of the 37th IEEE/ACM …, 2022 - dl.acm.org
As IoT systems are given more responsibility and autonomy, they offer greater benefits, but
also carry greater risks. We believe this trend invigorates an old challenge of software …
also carry greater risks. We believe this trend invigorates an old challenge of software …
" If security is required" engineering and security practices for machine learning-based IoT devices
The latest generation of IoT systems incorporate machine learning (ML) technologies on
edge devices. This introduces new engineering challenges to bring ML onto resource …
edge devices. This introduces new engineering challenges to bring ML onto resource …
A multi-method study of internet of things systems testing in industry
As the Internet of Things (IoT) grows, its failures may have dramatic consequences on the
lives of people who depend on it. Yet, it is hard to test IoT systems before they are deployed …
lives of people who depend on it. Yet, it is hard to test IoT systems before they are deployed …
A comprehensive study of real-world bugs in machine learning model optimization
Due to the great advance in machine learning (ML) techniques, numerous ML models are
expanding their application domains in recent years. To adapt for resource-constrained …
expanding their application domains in recent years. To adapt for resource-constrained …
Riding the IoT wave with VFuzz: discovering security flaws in smart homes
Z-Wave smart home Internet of Things devices are used to save energy, increase comfort,
and remotely monitor home activities. In the past, security researchers found Z-Wave device …
and remotely monitor home activities. In the past, security researchers found Z-Wave device …