Taxonomy of IoT Vulnerabilities
暂无分享,去创建一个
[1] Salvatore J. Stolfo,et al. A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan , 2010, ACSAC '10.
[2] Ata Elahi,et al. ZigBee Wireless Sensor and Control Network , 2009 .
[3] Assia Tria,et al. Modeling a node capture attack in a secure wireless sensor networks , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).
[4] Elisa Bertino,et al. Kalis — A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[5] Michael Backes,et al. Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification , 2016, USENIX Security Symposium.
[6] Nasir Ghani,et al. A first empirical look on internet-scale exploitations of IoT devices , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[7] Luiz Affonso Guedes,et al. Availability Issues in Wireless Visual Sensor Networks , 2014, Sensors.
[8] Adi Shamir,et al. Extended Functionality Attacks on IoT Devices: The Case of Smart Lights , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[9] Audrey A. Gendreau,et al. Survey of Intrusion Detection Systems towards an End to End Secure Internet of Things , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).
[10] W. Liu,et al. A unified architecture for integrating energy harvesting IoT devices with the Mobile Edge Cloud , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).
[11] Asaf Shabtai,et al. Advanced Security Testbed Framework for Wearable IoT Devices , 2016, ACM Trans. Internet Techn..
[12] Bruno Sinopoli,et al. Cyber Meets Control: A Novel Federated Approach for Resilient CPS Leveraging Real Cyber Threat Intelligence , 2017, IEEE Communications Magazine.
[13] Rajeev Kumar Kanth,et al. Distributed internal anomaly detection system for Internet-of-Things , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[14] Wade Trappe,et al. Low-Energy Security: Limits and Opportunities in the Internet of Things , 2015, IEEE Security & Privacy.
[15] Thiemo Voigt,et al. Intrusion Detection in the RPL-connected 6LoWPAN Networks , 2017, IoTPTS@AsiaCCS.
[16] Ahmad-Reza Sadeghi,et al. Security analysis on consumer and industrial IoT devices , 2016, 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC).
[17] Karl N. Levitt,et al. Is Anybody Home? Inferring Activity From Smart Home Network Traffic , 2016, 2016 IEEE Security and Privacy Workshops (SPW).
[18] M. Shamim Hossain,et al. Toward end-to-end biomet rics-based security for IoT infrastructure , 2016, IEEE Wireless Communications.
[19] Pekka Toivanen,et al. Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned , 2013, 2013 46th Hawaii International Conference on System Sciences.
[20] Angelo Furfaro,et al. Using virtual environments for the assessment of cybersecurity issues in IoT scenarios , 2017, Simul. Model. Pract. Theory.
[21] J. Alex Halderman,et al. Green Lights Forever: Analyzing the Security of Traffic Infrastructure , 2014, WOOT.
[22] Yi Zhou,et al. Understanding the Mirai Botnet , 2017, USENIX Security Symposium.
[23] Varshanth R. Rao,et al. Predictive node expiration based energy-aware source routing (PNEB ESR) protocol for wireless sensor networks , 2014, COMPUTE '14.
[24] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[25] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[26] Farinaz Koushanfar,et al. Heart-to-heart (H2H): authentication for implanted medical devices , 2013, CCS.
[27] Xiangjian He,et al. A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[28] Shahin Farahani,et al. ZigBee Wireless Networks and Transceivers , 2008 .
[29] Wen Hu,et al. Talos: Encrypted Query Processing for the Internet of Things , 2015, SenSys.
[30] Sasu Tarkoma,et al. Securebox: Toward Safer and Smarter IoT Networks , 2016, CAN@CoNEXT.
[31] Dawn Song,et al. Smart Locks: Lessons for Securing Commodity Internet of Things Devices , 2016, AsiaCCS.
[32] Giuseppe Piro,et al. Key Management Protocol with Implicit Certificates for IoT systems , 2015, IoT-Sys@MobiSys.
[33] Zuyi Li,et al. Modeling of Local False Data Injection Attacks With Reduced Network Information , 2015, IEEE Transactions on Smart Grid.
[34] J. Alex Halderman,et al. Analysis of the HTTPS certificate ecosystem , 2013, Internet Measurement Conference.
[35] Shahriar Mirabbasi,et al. Wireless Energy Harvesting for Internet of Things , 2014 .
[36] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[37] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[38] Raheem A. Beyah,et al. Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems , 2016, NDSS.
[39] He Wang,et al. MoLe: Motion Leaks through Smartwatch Sensors , 2015, MobiCom.
[40] J. Alex Halderman,et al. A Search Engine Backed by Internet-Wide Scanning , 2015, CCS.
[41] Niraj K. Jha,et al. A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.
[42] Mark Mohammad Tehranipoor,et al. Hardware security meets biometrics for the age of IoT , 2016, 2016 IEEE International Symposium on Circuits and Systems (ISCAS).
[43] Nasir D. Memon,et al. Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis , 2017, NDSS.
[44] Nicholas Hopper,et al. Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks , 2013, IEEE Transactions on Mobile Computing.
[45] Qi Alfred Chen,et al. ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms , 2017, NDSS.
[46] J. Jithish,et al. Sybil attack in IOT: Modelling and defenses , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[47] Max Mühlhäuser,et al. Multi-stage attack detection and signature generation with ICS honeypots , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[48] Salvatore J. Stolfo,et al. When Firmware Modifications Attack: A Case Study of Embedded Exploitation , 2013, NDSS.
[49] Yan Wang,et al. Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN , 2016, AsiaCCS.
[50] Haytham Elmiligi,et al. Multi-dimensional analysis of embedded systems security , 2016, Microprocess. Microsystems.
[51] Sean Carlisto de Alvarenga,et al. A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..
[52] Blase Ur,et al. The Current State of Access Control for Smart Devices in Homes , 2013 .
[53] Zhizhang Chen,et al. Power Analysis Attacks Against IEEE 802.15.4 Nodes , 2016, COSADE.
[54] Barton P. Miller,et al. An empirical study of the robustness of Windows NT applications using random testing , 2000 .
[55] Imran A. Zualkernan,et al. Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[56] Márk Félegyházi,et al. CryPLH: Protecting Smart Energy Systems from Targeted Attacks with a PLC Honeypot , 2014, SmartGridSec.
[57] Yuguang Fang,et al. Defending Against Physical Destruction Attacks on Wireless Sensor Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[58] Aref Meddeb,et al. 6LoWPAN multi-layered security protocol based on IEEE 802.15.4 security features , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[59] Rajkumar Buyya,et al. Aneka Cloud Application Platform and Its Integration with Windows Azure , 2011, ArXiv.
[60] Radha Poovendran,et al. Node capture attacks in wireless sensor networks: A system theoretic approach , 2010, 49th IEEE Conference on Decision and Control (CDC).
[61] Chang-Seop Park,et al. A Secure and Efficient ECQV Implicit Certificate Issuance Protocol for the Internet of Things Applications , 2017, IEEE Sensors Journal.
[62] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[63] Atul Prakash,et al. FlowFence: Practical Data Protection for Emerging IoT Application Frameworks , 2016, USENIX Security Symposium.
[64] Mansour Sheikhan,et al. Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach , 2017, Comput. Commun..
[65] Raheem A. Beyah,et al. Rethinking the Honeypot for Cyber-Physical Systems , 2016, IEEE Internet Computing.
[66] Nasir Ghani,et al. Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations , 2019, IEEE Communications Surveys & Tutorials.
[67] Baojiang Cui,et al. A Novel Fuzzing Method for Zigbee Based on Finite State Machine , 2014, Int. J. Distributed Sens. Networks.
[68] Jie Wu,et al. Defending Resource Depletion Attacks on Implantable Medical Devices , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[69] Alexandros G. Fragkiadakis,et al. A lightweight framework for secure life-logging in smart environments , 2013, Inf. Secur. Tech. Rep..
[70] Juan Lopez,et al. Firmware modification attacks on programmable logic controllers , 2013, Int. J. Crit. Infrastructure Prot..
[71] Amee A. Patel,et al. A Novel Proposal for Defending against Vampire Attack in WSN , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.
[72] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[73] Michail Maniatakos,et al. Impact of firmware modification attacks on power systems field devices , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[74] Stephen Dunlap,et al. An evaluation of modification attacks on programmable logic controllers , 2014, Int. J. Crit. Infrastructure Prot..
[75] Luca Bruno,et al. AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares , 2014, NDSS.
[76] Dengguo Feng,et al. Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing , 2005, IACR Cryptol. ePrint Arch..
[77] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[78] Zhao Yang Dong,et al. A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.
[79] Mark Mohammad Tehranipoor,et al. Protecting endpoint devices in IoT supply chain , 2015, 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[80] Apostolis Zarras,et al. Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces , 2015, AsiaCCS.
[81] Alex Biryukov,et al. Side-Channel Attacks Meet Secure Network Protocols , 2017, ACNS.
[82] Bradley Reaves,et al. An open virtual testbed for industrial control system security research , 2012, International Journal of Information Security.
[83] Thomas R. Henderson,et al. Host Identity Protocol Version 2 (HIPv2) , 2015, RFC.
[84] Carsten Bormann,et al. 6LoWPAN: The Wireless Embedded Internet , 2009 .
[85] Óscar García-Morchón,et al. Securing the IP-based internet of things with HIP and DTLS , 2013, WiSec '13.
[86] Eric Rescorla,et al. Datagram Transport Layer Security Version 1.2 , 2012, RFC.
[87] Sheetal Kalra,et al. A lightweight biometrics based remote user authentication scheme for IoT services , 2017, J. Inf. Secur. Appl..
[88] Gunasekaran Manogaran,et al. HIoTPOT: Surveillance on IoT Devices against Recent Threats , 2018, Wirel. Pers. Commun..
[89] Federico Chiariotti,et al. A game-theoretic analysis of energy-depleting jamming attacks , 2019, 2017 International Conference on Computing, Networking and Communications (ICNC).
[90] Jun Zhao,et al. On Resilience and Connectivity of Secure Wireless Sensor Networks Under Node Capture Attacks , 2017, IEEE Transactions on Information Forensics and Security.
[91] Hajar Mousannif,et al. Access control in the Internet of Things: Big challenges and new opportunities , 2017, Comput. Networks.
[92] Levente Buttyán,et al. XCS based hidden firmware modification on embedded devices , 2011, SoftCOM 2011, 19th International Conference on Software, Telecommunications and Computer Networks.
[93] Andrei V. Gurtov,et al. Two-phase authentication protocol for wireless sensor networks in distributed IoT applications , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[94] Dinil Mon Divakaran,et al. DEFT: A Distributed IoT Fingerprinting Technique , 2019, IEEE Internet of Things Journal.
[95] Cristina Alcaraz,et al. Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..
[96] Zheng Gong,et al. A Practical One-Time File Encryption Protocol for IoT Devices , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[97] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[98] Aurélien Francillon,et al. A Large-Scale Analysis of the Security of Embedded Firmwares , 2014, USENIX Security Symposium.
[99] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[100] Yuval Elovici,et al. ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis , 2017, SAC.
[101] Ali Saman Tosun,et al. Investigating Security and Privacy of a Cloud-Based Wireless IP Camera: NetCam , 2015, 2015 24th International Conference on Computer Communication and Networks (ICCCN).
[102] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[103] Andrei V. Gurtov,et al. PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications , 2014, Int. J. Distributed Sens. Networks.
[104] Tsutomu Matsumoto,et al. IoTPOT: A Novel Honeypot for Revealing Current IoT Threats , 2016, J. Inf. Process..
[105] Stefan Savage,et al. You've Got Vulnerability: Exploring Effective Vulnerability Notifications , 2016, USENIX Security Symposium.
[106] Michael Schukat,et al. A ZigBee honeypot to assess IoT cyberattack behaviour , 2017, 2017 28th Irish Signals and Systems Conference (ISSC).
[107] Ali Saman Tosun,et al. A Testbed for Security and Privacy Analysis of IoT Devices , 2016, 2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).
[108] Yasir Arfat Malkani,et al. A framework for securing mobile wireless sensor networks against physical attacks , 2016, 2016 International Conference on Emerging Technologies (ICET).
[109] Mark Allman,et al. Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy , 2016, NDSS.
[110] Vern Paxson,et al. Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension , 2016, WWW.
[111] Jean-Claude Bajard,et al. A New Security Model for Authenticated Key Agreement , 2010, SCN.
[112] Georg Carle,et al. DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.
[113] Meng Wu,et al. Robust detection of false data injection attacks for data aggregation in an Internet of Things-based environmental surveillance , 2017, Comput. Networks.
[114] Srinivasan Seshan,et al. Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things , 2015, HotNets.
[115] Niraj K. Jha,et al. Improving the Trustworthiness of Medical Device Software with Formal Verification Methods , 2013, IEEE Embedded Systems Letters.
[116] Yuval Elovici,et al. Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things , 2017, IoTPTS@AsiaCCS.
[117] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[118] George Markowsky,et al. Scanning for vulnerable devices in the Internet of Things , 2015, 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).
[119] Zinaida Benenson,et al. All Your Bulbs Are Belong to Us: Investigating the Current State of Security in Connected Lighting Systems , 2016, ArXiv.
[120] Rolf H. Weber,et al. Cybersecurity in the Internet of Things: Legal aspects , 2016, Comput. Law Secur. Rev..
[121] Peiyuan Zong,et al. Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be , 2017, ArXiv.
[122] Heng Yin,et al. Scalable Graph-based Bug Search for Firmware Images , 2016, CCS.
[123] Simon Duquennoy,et al. Secure Sharing of Partially Homomorphic Encrypted IoT Data , 2017, SenSys.
[124] Olivier Festor,et al. A Testing Framework for Discovering Vulnerabilities in 6LoWPAN Networks , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.
[125] Hsinchun Chen,et al. Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT) , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.
[126] Thiemo Voigt,et al. Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[127] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[128] Joan Arnedo-Moreno,et al. ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys , 2010, 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[129] Arkady B. Zaslavsky,et al. Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[130] Kerstin Eder,et al. The IoT Energy Challenge: A Software Perspective , 2018, IEEE Embedded Systems Letters.
[131] Fredrik Österlind,et al. A Sensor Network Simulator for the Contiki OS , 2006 .
[132] Kishore Angrishi,et al. Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets , 2017, ArXiv.
[133] Antonio Iera,et al. Understanding the Internet of Things: definition, potentials, and societal role of a fast evolving paradigm , 2017, Ad Hoc Networks.
[134] Robert H. Deng,et al. Lightweight Break-Glass Access Control System for Healthcare Internet-of-Things , 2018, IEEE Transactions on Industrial Informatics.