Network intrusion detection for IoT security based on learning techniques

N Chaabouni, M Mosbah, A Zemmari… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn
cyberattack exposed the critical fault-lines among smart networks. Security of IoT has …

A survey of cybersecurity certification for the internet of things

SN Matheu, JL Hernandez-Ramos… - ACM Computing …, 2020 - dl.acm.org
In recent years, cybersecurity certification is gaining momentum as the baseline to build a
structured approach to mitigate cybersecurity risks in the Internet of Things (IoT). This …

Learning to fuzz from symbolic execution with application to smart contracts

J He, M Balunović, N Ambroladze, P Tsankov… - Proceedings of the …, 2019 - dl.acm.org
Fuzzing and symbolic execution are two complementary techniques for discovering software
vulnerabilities. Fuzzing is fast and scalable, but can be ineffective when it fails to randomly …

Fuzzing: State of the art

H Liang, X Pei, X Jia, W Shen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As one of the most popular software testing techniques, fuzzing can find a variety of
weaknesses in a program, such as software bugs and vulnerabilities, by generating …

[图书][B] Internet-of-things (IoT) systems: architectures, algorithms, methodologies

D Serpanos, M Wolf - 2017 - Springer
The Internet of Things is the evolutionary step of the Internet that creates a worldwide
infrastructure interconnecting machines and humans. As the Internet became public in the …

Security testing: A survey

M Felderer, M Büchler, M Johns, AD Brucker… - Advances in …, 2016 - Elsevier
Identifying vulnerabilities and ensuring security functionality by security testing is a widely
applied measure to evaluate and improve the security of software. Due to the openness of …

Coverage-directed differential testing of JVM implementations

Y Chen, T Su, C Sun, Z Su, J Zhao - proceedings of the 37th ACM …, 2016 - dl.acm.org
Java virtual machine (JVM) is a core technology, whose reliability is critical. Testing JVM
implementations requires painstaking effort in designing test classfiles (*. class) along with …

An automata based intrusion detection method for internet of things

Y Fu, Z Yan, J Cao, O Koné… - Mobile Information Systems, 2017 - Wiley Online Library
Internet of Things (IoT) transforms network communication to Machine‐to‐Machine (M2M)
basis and provides open access and new services to citizens and companies. It extends the …

Fuzzers for stateful systems: Survey and Research Directions

C Daniele, SB Andarzian, E Poll - ACM Computing Surveys, 2023 - dl.acm.org
Fuzzing is a very effective testing methodology to find bugs. In a nutshell, a fuzzer sends
many slightly malformed messages to the software under test, hoping for crashes or …

Teezz: Fuzzing trusted applications on cots android devices

M Busch, A Machiry, C Spensky… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Security and privacy-sensitive smartphone applications use trusted execution environments
(TEEs) to protect sensitive operations from malicious code. By design, TEEs have privileged …