ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems

M Rak, G Salzillo, D Granata - Computers and Electrical Engineering, 2022 - Elsevier
Despite the growing spread of Internet of Things (IoT) ecosystems, their security assessment
is still an open issue. Identifying threats, vulnerabilities, and attacks is a costly and time …

A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach

V Casola, A De Benedictis, M Rak, U Villano - Journal of Systems and …, 2020 - Elsevier
Recent software development methodologies, as DevOps or Agile, are very popular and
widely used, especially for the development of cloud services and applications. They …

[HTML][HTML] Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments

M Benyahya, A Collen, S Kechagia, NA Nijdam - Computers & Security, 2022 - Elsevier
Abstract The Automated City Shuttles (ACSs) aim to shape the future public transportation
and provide more efficient and accessible mobility in smart cities. With the absence of a …

Toward the automation of threat modeling and risk assessment in IoT systems

V Casola, A De Benedictis, M Rak, U Villano - Internet of Things, 2019 - Elsevier
Abstract The Internet of Things (IoT) has recently become one of the most relevant emerging
technologies in the IT landscape. IoT systems are characterized by the high heterogeneity of …

Towards pentesting automation using the metasploit framework

O Valea, C Oprişa - 2020 IEEE 16th International Conference …, 2020 - ieeexplore.ieee.org
Penetration testing is a well known methodology assessing security vulnerabilities by
executing complex steps which form an attack. Professional pentesting is an expensive …

A comprehensive literature review of artificial intelligent practices in the field of penetration testing

DN Railkar, S Joshi - … Systems and Applications: Select Proceedings of …, 2023 - Springer
Penetration testing (PT) is a commonly available approach to dynamically assess the
defenses of a computer network via preparation and execution of every probable attack to …

[HTML][HTML] Distributed attack deployment capability for modern automated penetration testing

J Hance, J Milbrath, N Ross, J Straub - Computers, 2022 - mdpi.com
Cybersecurity is an ever-changing landscape. The threats of the future are hard to predict
and even harder to prepare for. This paper presents work designed to prepare for the …

Security testing for naval ship combat system software

CG Yi, YG Kim - IEEE Access, 2021 - ieeexplore.ieee.org
Military weapon systems are considered as “system of systems”(SoS). They comprise
various equipment based on computers and networks and have been developed using …

[PDF][PDF] Systematic IoT Penetration Testing: Alexa Case Study.

M Rak, G Salzillo, C Romeo - ITASEC, 2020 - ceur-ws.org
Abstract The Internet of Things paradigm arises many issues in terms of privacy and security.
Systems that are commonly configured by personnel with limited experience manage …

VAPE-BRIDGE: Bridging OpenVAS results for automating metasploit framework

K Vimala, S Fugkeaw - 2022 14th International Conference on …, 2022 - ieeexplore.ieee.org
Vulnerability assessment (VA) and penetration test (PenTest) are required by many
organizations to satisfy their security auditing and compliance. VA and PenTest are …