Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations

N Neshenko, E Bou-Harb, J Crichigno… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …

A review of blockchain architecture and consensus protocols: Use cases, challenges, and solutions

L Ismail, H Materwala - Symmetry, 2019 - mdpi.com
Over the last decade, blockchain technology has emerged to provide solutions to the
complexity and privacy challenges of using distributed databases. It reduces cost for …

The matter of heartbleed

Z Durumeric, F Li, J Kasten, J Amann… - Proceedings of the …, 2014 - dl.acm.org
The Heartbleed vulnerability took the Internet by surprise in April 2014. The vulnerability,
one of the most consequential since the advent of the commercial Internet, allowed attackers …

A search engine backed by Internet-wide scanning

Z Durumeric, D Adrian, A Mirian, M Bailey… - Proceedings of the …, 2015 - dl.acm.org
Fast Internet-wide scanning has opened new avenues for security research, ranging from
uncovering widespread vulnerabilities in random number generators to tracking the evolving …

State-of-the-art survey of artificial intelligent techniques for IoT security

TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022 - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …

A {Large-scale} analysis of the security of embedded firmwares

A Costin, J Zaddach, A Francillon… - 23rd USENIX security …, 2014 - usenix.org
As embedded systems are more than ever present in our society, their security is becoming
an increasingly important issue. However, based on the results of many recent analyses of …

A survey of methods for encrypted traffic classification and analysis

P Velan, M Čermák, P Čeleda… - International Journal of …, 2015 - Wiley Online Library
With the widespread use of encrypted data transport, network traffic encryption is becoming
a standard nowadays. This presents a challenge for traffic measurement, especially for …

Let's Encrypt: an automated certificate authority to encrypt the entire web

J Aas, R Barnes, B Case, Z Durumeric… - Proceedings of the …, 2019 - dl.acm.org
Let's Encrypt is a free, open, and automated HTTPS certificate authority (CA) created to
advance HTTPS adoption to the entire Web. Since its launch in late 2015, Let's Encrypt has …

Measuring {HTTPS} adoption on the web

AP Felt, R Barnes, A King, C Palmer, C Bentzel… - 26th USENIX security …, 2017 - usenix.org
HTTPS ensures that the Web has a base level of privacy and integrity. Security engineers,
researchers, and browser vendors have long worked to spread HTTPS to as much of the …

An end-to-end measurement of certificate revocation in the web's PKI

Y Liu, W Tome, L Zhang, D Choffnes, D Levin… - Proceedings of the …, 2015 - dl.acm.org
Critical to the security of any public key infrastructure (PKI) is the ability to revoke previously
issued certificates. While the overall SSL ecosystem is well-studied, the frequency with …