Analysis of consumer IoT device vulnerability quantification frameworks

SA Baho, J Abawajy - Electronics, 2023 - mdpi.com
The increasing deployment of Internet of Things (IoT) devices in mission-critical systems has
made them more appealing to attackers. Cyberattacks on IoT devices have the potential to …

Integration flows modeling in the context of architectural views

T Górski - IEEE access, 2023 - ieeexplore.ieee.org
In an increasing number of software applications, the execution of their functions depends
on communication with external systems. Messaging enables the integration of information …

Uml profile for messaging patterns in service-oriented architecture, microservices, and internet of things

T Górski - Applied Sciences, 2022 - mdpi.com
The exchange of information among information technology (IT) systems is inevitable.
Service fulfillment often involves sending and receiving messages. The article presents a set …

A Software Vulnerability Management Framework for the Minimization of System Attack Surface and Risk

P Sotiropoulos, CM Mathas, C Vassilakis… - Electronics, 2023 - mdpi.com
Current Internet of Things (IoT) systems comprise multiple software systems that are
deployed to provide users with the required functionalities. System architects create system …

BDPM: A secure batch dynamic password management scheme in industrial internet environments

J Feng, R Yan, G Han, W Zhang - Future Generation Computer Systems, 2024 - Elsevier
The rapid development of Industrial Internet has promoted the deep integration of
Information Technology (IT) and Industrial Control (IC), so that network attacks have …

Transparent security method for automating IoT security assessments

R Kaksonen, K Halunen, M Laakso… - … Conference on Information …, 2023 - Springer
People and businesses are dependent on the security of the Internet of Things (IoT). Vendor-
independent security assessment and certification intends to provide an objective view of …

Automating IoT Security Standard Testing by Common Security Tools

R Kaksonen, K Halunen, M Laakso… - Proceedings of the 10th …, 2024 - oulurepo.oulu.fi
Cybersecurity standards play a vital role in safeguarding the Internet of Things (IoT).
Currently, standard compliance is assessed through manual reviews by security experts, a …

Comprehensive analysis and remediation of insecure direct object references (IDOR) vulnerabilities in android APIs

S Yulianto, RR Abdullah… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The escalating visibility of secure direct object reference (IDOR) vulnerabilities in API
security, as indicated in the compilation of OWASP Top 10 API Security Risks, highlights a …

Efficient Fingerprinting Attack on Web Applications: An Adaptive Symbolization Approach

X Yang, J Xu, G Li - Electronics, 2023 - mdpi.com
Website fingerprinting is valuable for many security solutions as it provides insights into
applications that are active on the network. Unfortunately, the existing techniques primarily …

[PDF][PDF] DEVELOPMENT OF A SECURITY TESTING PROCESS FOR YOCTO LINUX-BASED DISTRIBUTIONS

MAB Ashfaq - 2023 - trepo.tuni.fi
This thesis focuses on the realization of a security testing process for a Yocto Linux-based
distribution. It is conducted as an industrial thesis for a specific company, with the aim of …