Fuzzing vulnerability discovery techniques: Survey, challenges and future directions

C Beaman, M Redbourne, JD Mummery, S Hakak - Computers & Security, 2022 - Elsevier
Fuzzing is a powerful tool for vulnerability discovery in software, with much progress being
made in the field in recent years. There is limited literature available on the fuzzing …

A systematic review of fault injection attacks on IOT systems

A Gangolli, QH Mahmoud, A Azim - Electronics, 2022 - mdpi.com
The field of the Internet of Things (IoT) is growing at a breakneck pace and its applications
are becoming increasingly sophisticated with time. Fault injection attacks on IoT systems are …

Analysis of consumer IoT device vulnerability quantification frameworks

SA Baho, J Abawajy - Electronics, 2023 - mdpi.com
The increasing deployment of Internet of Things (IoT) devices in mission-critical systems has
made them more appealing to attackers. Cyberattacks on IoT devices have the potential to …

Iotinfer: Automated blackbox fuzz testing of iot network protocols guided by finite state machine inference

Z Shu, G Yan - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
The popularity of Internet of Things (IoT) devices calls for effective yet efficient methods to
assess the security and resilience of IoT devices. In this work, we explore a new heuristic …

A survey on big IoT data indexing: Potential solutions, recent advancements, and open issues

Z Kouahla, AE Benrazek, MA Ferrag, B Farou, H Seridi… - Future Internet, 2021 - mdpi.com
The past decade has been characterized by the growing volumes of data due to the
widespread use of the Internet of Things (IoT) applications, which introduced many …

A systematic review of IoT systems testing: Objectives, approaches, tools, and challenges

JB Minani, F Sabir, N Moha… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) systems are becoming prevalent in various domains, from healthcare
to smart homes. Testing IoT systems is critical in ensuring their reliability. Previous papers …

Is your kettle smarter than a hacker? a scalable tool for assessing replay attack vulnerabilities on consumer iot devices

S Lazzaro, V De Angelis, AM Mandalari… - 2024 IEEE …, 2024 - ieeexplore.ieee.org
Consumer Internet of Things (IoT) devices often leverage the local network to communicate
with the corresponding companion app or other devices. This has benefits in terms of …

PDFuzzerGen: Policy‐Driven Black‐Box Fuzzer Generation for Smart Devices

Y Cheng, W Fan, W Huang, G Yu, Y Han… - Security and …, 2022 - Wiley Online Library
Black‐box fuzzing is a testing technique to find both known and unknown vulnerabilities in
software. When applying black‐box fuzzing to smart devices, the main idea is to take a smart …

A new decision-making method for service discovery and selection in the internet of things using flower pollination algorithm

SG Tabrizi, NJ Navimipour, AS Danesh… - Wireless Personal …, 2022 - Springer
Abstract The Internet of Things (IoT) enables intelligent and heterogeneous things to access
the Internet and subsequently interact and share info. A service management methodology …

V-Digger: An Efficient and Secure Vulnerability Assessment for Large-Scale ISP Network

N Lu, R Huang, M Yao, W Shi… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Vulnerability assessment allows cyber security professionals to discover vulnerable end
devices. Generally, in such a process one extracts the default Service Banner (SB) from the …