[PDF][PDF] Poster: Discovering Authentication Bypass Vulnerabilities in IoT Devices through Guided Concolic Execution

JW Huang, NJ Tsai, SM Cheng - ndss-symposium.org
The severity of attacks on IoT devices underscores the pressing need for efficient and
effective vulnerability discovery methods. Specifically, authentication-related vulnerabilities …

IoTCID: A Dynamic Detection Technology for Command Injection Vulnerabilities in IoT Devices

H Chen, J Ma, B Cui, J Fu - International Journal of Advanced …, 2022 - search.proquest.com
The pervasiveness of IoT devices has brought us convenience as well as the risks of
security vulnerabilities. However, traditional device vulnerability detection methods cannot …

argXtract: Deriving IoT security configurations via automated static analysis of stripped arm cortex-m binaries

P Sivakumaran, J Blasco - Proceedings of the 37th Annual Computer …, 2021 - dl.acm.org
Recent high-profile attacks on the Internet of Things (IoT) have brought to the forefront the
vulnerabilities in “smart” devices, and have revealed poor device configuration to be the root …

Dynamic Analysis Tool for IoT Device

D Jang, T Kim, D Kim - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
Many researches are considered when performing fuzzing, but the limitations are clear for
IoT devices and services. First, we need to perform a blackbox fuzzing, and in most cases …

Automated vulnerability discovery and exploitation in the Internet of Things

Z Wang, Y Zhang, Z Tian, Q Ruan, T Liu, H Wang, Z Liu… - Sensors, 2019 - mdpi.com
Recently, automated software vulnerability detection and exploitation in Internet of Things
(IoT) has attracted more and more attention, due to IoT's fast adoption and high social …

Towards System-Level Security Analysis of IoT Using Attack Graphs

Z Fang, H Fu, T Gu, P Hu, J Song… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Most IoT systems involve IoT devices, communication protocols, remote cloud, IoT
applications, mobile apps, and the physical environment. However, existing IoT security …

Iota: A framework for analyzing system-level security of iots

Z Fang, H Fu, T Gu, P Hu, J Song… - 2022 IEEE/ACM …, 2022 - ieeexplore.ieee.org
Most IoT systems involve IoT devices, communication protocols, remote cloud, IoT
applications, mobile apps, and the physical environment. However, existing IoT security …

Empirical study of system resources abused by iot attackers

Z Yin, Y Xu, C Zhou, Y Jiang - Proceedings of the 37th IEEE/ACM …, 2022 - dl.acm.org
IoT devices have been under frequent attacks in recent years, causing severe impacts.
Previous research has shown the evolution and features of some specific IoT malware …

Advances in IoT security: Vulnerabilities, enabled criminal services, attacks, and countermeasures

YR Siwakoti, M Bhurtel, DB Rawat… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Although the Internet of Things (IoT) incorporates millions of heterogeneous devices to
provide advanced intelligent services and has greatly impacted our lives over time, it has a …

Securing emerging IoT systems through systematic analysis and design

Q Wang - 2020 - ideals.illinois.edu
Abstract The Internet of Things (IoT) is growing very rapidly. A variety of IoT systems have
been developed and employed in many domains such as smart home, smart city and …