Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations

N Neshenko, E Bou-Harb, J Crichigno… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …

State-of-the-art survey of artificial intelligent techniques for IoT security

TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022 - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …

Understanding the mirai botnet

M Antonakakis, T April, M Bailey, M Bernhard… - 26th USENIX security …, 2017 - usenix.org
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …

Network hygiene, incentives, and regulation: deployment of source address validation in the internet

M Luckie, R Beverly, R Koga, K Keys, JA Kroll… - Proceedings of the …, 2019 - dl.acm.org
The Spoofer project has collected data on the deployment and characteristics of IP source
address validation on the Internet since 2005. Data from the project comes from participants …

SoK: Quantifying cyber risk

DW Woods, R Böhme - 2021 IEEE Symposium on Security and …, 2021 - ieeexplore.ieee.org
This paper introduces a causal model inspired by structural equation modeling that explains
cyber risk outcomes in terms of latent factors measured using reflexive indicators. First, we …

An analysis of phishing blacklists: Google safe browsing, openphish, and phishtank

S Bell, P Komisarczuk - … of the Australasian Computer Science Week …, 2020 - dl.acm.org
Blacklists play a vital role in protecting internet users against phishing attacks. The
effectiveness of blacklists depends on their size, scope, update speed and frequency, and …

You've got vulnerability: Exploring effective vulnerability notifications

F Li, Z Durumeric, J Czyz, M Karami, M Bailey… - 25th USENIX Security …, 2016 - usenix.org
Security researchers can send vulnerability notifications to take proactive measures in
securing systems at scale. However, the factors affecting a notification's efficacy have not …

Hey, you have a problem: On the feasibility of {Large-Scale} web vulnerability notification

B Stock, G Pellegrino, C Rossow, M Johns… - 25th USENIX Security …, 2016 - usenix.org
Large-scale discovery of thousands of vulnerableWeb sites has become a frequent event,
thanks to recent advances in security research and the rise in maturity of Internet-wide …

Didn't You Hear Me?---Towards More Successful Web Vulnerability Notifications

B Stock, G Pellegrino, F Li, M Backes, C Rossow - 2018 - publications.cispa.de
After treating the notification of affected parties as mere side-notes in research, our
community has recently put more focus on how vulnerability disclosure can be conducted at …

Exposed infrastructures: Discovery, attacks and remediation of insecure ics remote management devices

T Sasaki, A Fujita, CH Gañán… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Geographically distributed infrastructures, such as buildings, dams, and solar power plants,
are commonly maintained via Internet-connected remote management devices. Previous …