Smart home security: challenges, issues and solutions at different IoT layers

H Touqeer, S Zaman, R Amin, M Hussain… - The Journal of …, 2021 - Springer
Abstract The Internet of Things is a rapidly evolving technology in which interconnected
computing devices and sensors share data over the network to decipher different problems …

[HTML][HTML] Review of Smart-Home Security Using the Internet of Things

G Vardakis, G Hatzivasilis, E Koutsaki, N Papadakis - Electronics, 2024 - mdpi.com
As the Internet of Things (IoT) continues to revolutionize the way we interact with our living
spaces, the concept of smart homes has become increasingly prevalent. However, along …

A study of c/c++ code weaknesses on stack overflow

H Zhang, S Wang, H Li, TH Chen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Stack Overflow hosts millions of solutions that aim to solve developers' programming issues.
In this crowdsourced question answering process, Stack Overflow becomes a code hosting …

End-to-end trust and security for Internet of Things applications

S Bhattarai, Y Wang - Computer, 2018 - ieeexplore.ieee.org
Many Internet of Things (IoT) devices utilize the cloud to store data and synchronize with one
another. Because data breaches can occur anywhere en route to the cloud, ensuring end-to …

The presence, trends, and causes of security vulnerabilities in operating systems of iot's low-end devices

A Al-Boghdady, K Wassif, M El-Ramly - Sensors, 2021 - mdpi.com
Internet of Things Operating Systems (IoT OSs) run, manage and control IoT devices.
Therefore, it is important to secure the source code for IoT OSs, especially if they are …

On the design of IoT security: Analysis of software vulnerabilities for smart grids

CM Mathas, C Vassilakis, N Kolokotronis… - Energies, 2021 - mdpi.com
The 5G communication network will underpin a vast number of new and emerging services,
paving the way for unprecedented performance and capabilities in mobile networks. In this …

Scope: Evaluating llms for software vulnerability detection

J Gonçalves, T Dias, E Maia, I Praça - arXiv preprint arXiv:2407.14372, 2024 - arxiv.org
In recent years, code security has become increasingly important, especially with the rise of
interconnected technologies. Detecting vulnerabilities early in the software development …

[PDF][PDF] Source code vulnerabilities in IoT software systems

SM Alnaeli, M Sarnowski, M Aman… - Adv. Sci. Technol. Eng …, 2017 - academia.edu
An empirical study that examines the usage of known vulnerable statements in software
systems developed in C/C++ and used for IoT is presented. The study is conducted on 18 …

OVER: Overhauling vulnerability detection for IoT through an adaptable and automated static analysis framework

V Sachidananda, S Bhairav, Y Elovici - Proceedings of the 35th Annual …, 2020 - dl.acm.org
Internet of Things (IoT) exposes various vulnerabilities at the software level. In this paper, we
propose a static analysis framework for IoT. The proposed framework is designed for …

[PDF][PDF] Analysis of code vulnerabilities in repositories of github and rosettacode: A comparative study

MSNA Malik, MS Naveed - … Journal of Innovations in Science & …, 2022 - researchgate.net
__________________________________… pen-source code hosted online at
programming portals is present in 99% of commercial software and is common practice …