Iovt: Internet of vulnerable things? threat architecture, attack surfaces, and vulnerabilities in internet of things and its applications towards smart grids

P Anand, Y Singh, A Selwal, PK Singh, RA Felseghi… - Energies, 2020 - mdpi.com
… of the Internet of Things to the Internet of Vulnerable Things. The subsequent sections are
… the attack surfaces in an IoT system. Thereafter, we discuss the security vulnerabilities and …

[图书][B] Measuring relative attack surfaces

M Howard, J Pincus, JM Wing - 2005 - Springer
… and what things should … attacks can exploit the same vulnerability via different channels.
The Microsoft Security Bulletin MS02-005, posted February 11, 2002, reports six vulnerabilities

Cyber security of smart homes: Development of a reference architecture for attack surface analysis

K Ghirardello, C Maple, D Ng… - … in the Internet of Things …, 2018 - ieeexplore.ieee.org
… Furthermore, this document demonstrates how the architecture can be used to determine
the various attack surfaces of a home automation system from which its key vulnerabilities can …

Attack surface modeling and assessment for penetration testing of IoT system designs

Y Mahmoodi, S Reiter, A Viehl… - 2018 21st Euromicro …, 2018 - ieeexplore.ieee.org
… for establishing the Internet-of-Things (IoT) paradigm. In this … an approach for attack surface
and attack behavior modeling… Five stereotypes are provided to represent vulnerable points …

Comprehensive experimental analyses of automotive attack surfaces

S Checkoway, D McCoy, B Kantor… - 20th USENIX security …, 2011 - usenix.org
… two aspects of the attack surface deeply, identify concrete vulnerabilities, and explore and
… clear ways to predict such things, especially in the absence of any known attacks in the wild. …

A Software Vulnerability Management Framework for the Minimization of System Attack Surface and Risk

P Sotiropoulos, CM Mathas, C Vassilakis… - Electronics, 2023 - mdpi.com
Current Internet of Things (IoT) systems comprise multiple … All deployed software however may
entail vulnerabilities, … further increase of the system attack surface and the associated risk. …

Attack surface analysis of permissioned blockchain platforms for smart cities

A Davenport, S Shetty, X Liang - 2018 IEEE International Smart …, 2018 - ieeexplore.ieee.org
… Beyond that, systems such as city wide sensor networks and the Internet of Things (IoT) can
vulnerabilities due to attacks outlined in section III and are as follows: • Box 1: Vulnerable to …

Exploring the attack surfaces in blockchain enabled smart cities

X Liang, S Shetty, D Tosh - 2018 IEEE international smart cities …, 2018 - ieeexplore.ieee.org
… The proliferation of Internet-of-Things (IoT) and wireless … With this concept, new attack
surfaces are being identified, but … In addition, we discuss these vulnerabilities and how they …

A systematic review on social robots in public spaces: Threat landscape and attack surface

SO Oruma, M Sánchez-Gordón, R Colomo-Palacios… - Computers, 2022 - mdpi.com
attack surfaces for threat actors. When social robots are connected to the Internet, they are
exposed to the same threats and vulnerabilities as other Internet of Thingsattack surface. The …

Identifying attack surfaces in the evolving space industry using reference architectures

M Bradbury, C Maple, H Yuan… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
… to allow attack surface analysis. Since newer entrants in NewSpace and the Internet of Space
Things are not … paths through the system via compromised or vulnerable components. This …