A taxonomy of IoT firmware security and principal firmware analysis techniques

I Nadir, H Mahmood, G Asadullah - International Journal of Critical …, 2022 - Elsevier
Abstract Internet of Things (IoT) has come a long way since its inception. However, the
standardization process in IoT systems for a secure IoT solution is still in its early days …

A Review of IoT Firmware Vulnerabilities and Auditing Techniques

T Bakhshi, B Ghita, I Kuzminykh - Sensors, 2024 - mdpi.com
In recent years, the Internet of Things (IoT) paradigm has been widely applied across a
variety of industrial and consumer areas to facilitate greater automation and increase …

A smart parking solution by integrating NB-IoT radio communication technology into the core IoT platform

E Kadusic, N Zivic, C Ruland, N Hadzajlic - Future Internet, 2022 - mdpi.com
With the emerging Internet of Things (IoT) technologies, the smart city paradigm has become
a reality. Wireless low-power communication technologies (LPWAN) are widely used for …

TEEFuzzer: A fuzzing framework for trusted execution environments with heuristic seed mutation

G Duan, Y Fu, B Zhang, P Deng, J Sun, H Chen… - Future Generation …, 2023 - Elsevier
With the rapid development of the Internet, data security faces new challenges. As a bridge
between the underlying hardware and upper layer applications, the operating system plays …

A systematic review of IoT systems testing: Objectives, approaches, tools, and challenges

JB Minani, F Sabir, N Moha… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) systems are becoming prevalent in various domains, from healthcare
to smart homes. Testing IoT systems is critical in ensuring their reliability. Previous papers …

CT-IoT: a combinatorial testing-based path selection framework for effective IoT testing

L Hu, WE Wong, DR Kuhn, RN Kacker, S Li - Empirical Software …, 2022 - Springer
Abstract Testing Internet of Things (IoT) systems is challenging. This is not only because of
the various aspects of IoT systems, such as software, hardware, and network that need to be …

Maskfuzzer: A maskgan-based industrial control protocol fuzz testing framework

W Sun, B Zhang, J Ding, M Tang - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Industrial control network security is undoubtedly important for an industrial control system.
Fuzzy testing is an important method to detect network protocol program security …

Model‐Based Grey‐Box Fuzzing of Network Protocols

Y Pan, W Lin, L Jiao, Y Zhu - Security and Communication …, 2022 - Wiley Online Library
The widely used network protocols play a crucial role in various systems. However, the
protocol vulnerabilities caused by the design of the network protocol or its implementation by …

RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces

N Bennett, W Zhu, B Simon, R Kennedy… - Proceedings of the …, 2024 - dl.acm.org
Cellular network infrastructure serves as the backbone of modern mobile wireless
communication. As such, cellular cores must be proactively secured against external threats …

Refraction reverse learning based hybrid Namib Antenna Beetle Optimization for resource allocation in NB-IoT platform

MK Singh, YK Verma - Multimedia Tools and Applications, 2024 - Springer
The efficient allocation of resources is a critical challenge in the context of Narrowband IoT
(NB-IoT) networks. This paper presents the Hybrid Namib Antenna Beetle optimization with …