Vulnerability studies and security postures of IoT devices: A smart home case study

BD Davis, JC Mason, M Anwar - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) technology has revolutionized our daily lives in many ways-whether
it is the way we conduct our day-to-day activities inside our home, or the way we control our …

[PDF][PDF] Insecurity in the Internet of Things

MB Barcena, C Wueest - Security response, symantec, 2015 - researchgate.net
The Internet of Things (IoT) market has begun to take off. Consumers can buy connected
versions of nearly every household appliance available. However, despite its increasing …

Systematically evaluating security and privacy for consumer IoT devices

F Loi, A Sivanathan, HH Gharakheili… - Proceedings of the …, 2017 - dl.acm.org
Internet-of-Things (IoT) devices such as smart bulbs, cameras, and health monitors are
being enthusiastically adopted by consumers, with numbers projected to rise to the billions …

[HTML][HTML] Penetration testing of connected households

F Heiding, E Süren, J Olegård, R Lagerström - Computers & Security, 2023 - Elsevier
Connected devices have become an integral part of modern homes and household devices,
such as vacuum cleaners and refrigerators, are now often connected to networks. This …

Consumer IoT: Security vulnerability case studies and solutions

T Alladi, V Chamola, B Sikdar… - IEEE Consumer …, 2020 - ieeexplore.ieee.org
As consumer Internet of Things (IoT) devices become increasingly pervasive in our society,
there is a need to understand the underpinning security risks. Therefore, in this article, we …

End user security and privacy concerns with smart homes

E Zeng, S Mare, F Roesner - … symposium on usable privacy and security …, 2017 - usenix.org
The Internet of Things is becoming increasingly widespread in home environments.
Consumers are transforming their homes into smart homes, with internet-connected sensors …

Looking from the mirror: Evaluating {IoT} device security through mobile companion apps

X Wang, Y Sun, S Nanda, XF Wang - 28th USENIX security symposium …, 2019 - usenix.org
Smart home IoT devices have increasingly become a favorite target for the cybercriminals
due to their weak security designs. To identify these vulnerable devices, existing …

Identifying the attack surface for IoT network

S Rizvi, RJ Orr, A Cox, P Ashokkumar, MR Rizvi - Internet of Things, 2020 - Elsevier
For this research, our primary goal is to define an attack surface for networks utilizing the IoT
(Internet of Things) devices. The IoT consists of systems of integrated objects, computing …

The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved

W Zhou, Y Jia, A Peng, Y Zhang… - IEEE Internet of things …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) is an increasingly popular technology that enables physical devices,
vehicles, home appliances, etc., to communicate and even inter operate with one another. It …

A survey of security vulnerability analysis, discovery, detection, and mitigation on IoT devices

M Yu, J Zhuge, M Cao, Z Shi, L Jiang - Future Internet, 2020 - mdpi.com
With the prosperity of the Internet of Things (IoT) industry environment, the variety and
quantity of IoT devices have grown rapidly. IoT devices have been widely used in smart …