State-of-the-art survey of artificial intelligent techniques for IoT security

TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022 - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …

Machine learning enabled industrial iot security: Challenges, trends and solutions

C Ni, SC Li - Journal of Industrial Information Integration, 2024 - Elsevier
Abstract Introduction: The increasingly integrated Industrial IoT (IIoT) with industrial systems
brings benefits such as intelligent analytics, predictive maintenance, and remote monitoring …

Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned

D Kim, E Kim, SK Cha, S Son… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Binary code similarity analysis (BCSA) is widely used for diverse security applications,
including plagiarism detection, software license violation detection, and vulnerability …

A Review of IoT Firmware Vulnerabilities and Auditing Techniques

T Bakhshi, B Ghita, I Kuzminykh - Sensors, 2024 - mdpi.com
In recent years, the Internet of Things (IoT) paradigm has been widely applied across a
variety of industrial and consumer areas to facilitate greater automation and increase …

No more companion apps hacking but one dongle: Hub-based blackbox fuzzing of iot firmware

X Ma, Q Zeng, H Chi, L Luo - Proceedings of the 21st Annual …, 2023 - dl.acm.org
Given the massive difficulty in emulating IoT firmware, blackbox fuzzing of IoT devices for
vulnerability discovery has become an attractive option. However, existing blackbox IoT …

A survey on IoT & embedded device firmware security: architecture, extraction techniques, and vulnerability analysis frameworks

S Ul Haq, Y Singh, A Sharma, R Gupta… - Discover Internet of Things, 2023 - Springer
IoT and Embedded devices grow at an exponential rate, however, without adequate security
mechanisms in place. One of the key challenges in the cyber world is the security of these …

Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch

T Kim, A Ding, S Etigowni, P Sun, J Chen… - Proceedings of the 20th …, 2022 - dl.acm.org
Unmanned Aerial Vehicles as a service (UAVaaS) has increased the field deployment of
Robotic Aerial Vehicles (RAVs) for different services such as transportation and terrain …

HSAS-MD analyzer: a hybrid security analysis system using model-checking technique and deep learning for malware detection in IoT apps

AA Hamza, IT Abdel Halim, MA Sobh, AM Bahaa-Eldin - Sensors, 2022 - mdpi.com
Established Internet of Things (IoT) platforms suffer from their inability to determine whether
an IoT app is secure or not. A security analysis system (SAS) is a protective shield against …

HEBCS: A High-Efficiency Binary Code Search Method

X Sun, Q Wei, J Du, Y Wang - Electronics, 2023 - mdpi.com
Binary code search is a technique that involves finding code with similarity to a given code
within a code database. It finds extensive application in scenarios such as vulnerability …

BovdGFE: buffer overflow vulnerability detection based on graph feature extraction

X Lv, T Peng, J Chen, J Liu, X Hu, R He, M Jiang… - Applied …, 2023 - Springer
Automatically detecting buffer overflow vulnerabilities is an important research topic in
software security. Recent studies have shown that vulnerability detection performance …