IoT-PEN: An E2E Penetration Testing Framework for IoT

[1]  Kolin Paul,et al.  Assessment of SCADA System Vulnerabilities , 2019, 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).

[2]  Vasaka Visoottiviseth,et al.  PENTOS: Penetration testing tool for Internet of Thing devices , 2017, TENCON 2017 - 2017 IEEE Region 10 Conference.

[3]  Kishore Angrishi,et al.  Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets , 2017, ArXiv.

[4]  Qiong Jia,et al.  Automatic Generation Algorithm of Penetration Graph in Penetration Testing , 2014, 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[5]  Robert A. Martin,et al.  Vulnerability Type Distributions in CVE , 2007 .

[6]  Thaier Hayajneh,et al.  Penetration testing: Concepts, attack methods, and defense strategies , 2016, 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT).

[7]  Hongsong Chen,et al.  Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems , 2018, ICT Express.

[8]  Kolin Paul,et al.  PatchRank: Ordering updates for SCADA systems , 2019, 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).

[9]  Mariam Ibrahim,et al.  A2G2V: Automated Attack Graph Generator and Visualizer , 2018 .

[10]  Xinming Ou,et al.  A scalable approach to attack graph generation , 2006, CCS '06.

[11]  Kemal Bicakci,et al.  Automated Generation of Attack Graphs Using NVD , 2018, CODASPY.

[12]  Kolin Paul,et al.  IoT-PEN: A Penetration Testing Framework for IoT , 2020, 2020 International Conference on Information Networking (ICOIN).

[13]  Shancang Li,et al.  5G Internet of Things: A survey , 2018, J. Ind. Inf. Integr..

[14]  Edmund M. Clarke,et al.  Ranking Attack Graphs , 2006, RAID.