Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3617072.3617110acmotherconferencesArticle/Chapter ViewAbstractPublication PageseurousecConference Proceedingsconference-collections
research-article

But is it exploitable? Exploring how Router Vendors Manage and Patch Security Vulnerabilities in Consumer-Grade Routers

Published: 16 October 2023 Publication History

Abstract

Millions of consumer-grade routers are vulnerable to security attacks. Router network attacks are dangerous and infections, presenting a serious security threat. They account for 80% of infected devices in the market, posing a greater threat than infected IoT devices and desktop computers. Routers offer an attractive target of attacks due to their gateway function to home networks, internet accessibility, and higher likelihood of having vulnerabilities. A major problem with these routers is their unpatched and unaddressed security vulnerabilities. Reports show that 30% of critical router vulnerabilities discovered in 2021 have not received any response from vendors. Why?
To better understand how router vendors manage and patch vulnerabilities in consumer-grade routers, and the accompanying challenges, we conducted 30 semi-structured interviews with professionals in router vendor companies selling broadband and retail routers in the UK. We found that router professionals prioritize vulnerability patching based on customer impact rather than vulnerability severity score. However, they experienced obstacles in patching vulnerabilities due to outsourcing development to third parties and the inability to support outdated models. To address these challenges, they developed workarounds such as offering replacement routers and releasing security advisories. However, they received pushback from customers who were not technically capable or concerned about security. Based on our results, we concluded with recommendations to improve security practice in routers.

References

[1]
Noura Alomar, Primal Wijesekera, Edward Qiu, and Serge Egelman. 2020. " You’ve got your nice list of bugs, now what?" vulnerability discovery and management processes in the wild. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). 319–339.
[2]
Henrique Alves, Baldoino Fonseca, and Nuno Antunes. 2016. Software metrics and security vulnerabilities: dataset and exploratory study. In 2016 12th European Dependable Computing Conference (EDCC). IEEE, 37–44.
[3]
Kim Andersson and Patryk Szewczyk. 2011. Insecurity by obscurity continues: are ADSL router manuals putting end-users at risk. Australian Information Security Management Conference (Jan. 2011). https://doi.org/10.4225/75/57b52975cd8b4
[4]
Ashish Arora, Chris Forman, Anand Nandkumar, and Rahul Telang. 2010. Competition and patching of security vulnerabilities: An empirical analysis. Information Economics and Policy 22, 2 (May 2010), 164–177. https://ideas.repec.org/a/eee/iepoli/v22y2010i2p164-177.html
[5]
Rowland Atkinson and John Flint. 2001. Accessing hidden and hard-to-reach populations: Snowball research strategies. Social research update 33, 1 (2001), 1–4. Publisher: Guildord.
[6]
Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, Chris Wright, and Adam Shostack. 2002. Timing the Application of Security Patches for Optimal Uptime.Proceedings of LISA’02: Sixteenth Systems Administration Conference, 233–242.
[7]
Peter Birmingham and David Wilkinson. 2003. Using research instruments: A guide for researchers. Routledge.
[8]
B. Bloor. 2003. The patch problem: It’s costing your business real dollars. Baroudi Bloor (2003). https://www.netsense.info/downloads/PatchProblemReport_BaroudiBloor.pdf
[9]
John M. Blythe and Lynne Coventry. 2018. Costly but effective: Comparing the factors that influence employee anti-malware behaviours. Computers in Human Behavior 87 (Oct. 2018), 87–97. https://doi.org/10.1016/j.chb.2018.05.023
[10]
John M. Blythe, Lynne Coventry, and Linda Little. 2015. Unpacking Security Policy Compliance: The Motivators and Barriers of Employees’ Security Behaviors. In Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security (Ottawa, Canada) (SOUPS ’15). USENIX Association, USA, 103–122.
[11]
Brennen Bouwmeester, Elsa Rodríguez, Carlos Gañán, Michel van Eeten, and Simon Parkin. 2021. "The Thing Doesn’t Have a Name": Learning from Emergent {Real-World} Interventions in Smart Home Security. 493–512. https://www.usenix.org/conference/soups2021/presentation/bouwmeester
[12]
Matt Burgess. 2018. The IoT’s security nightmare will never end. You can now search insecure cameras by address. Wired UK (Nov. 2018). https://www.wired.co.uk/article/internet-of-things-security-camera-search-location
[13]
Charles F. Cannell, Peter V. Miller, and Lois Oksenberg. 1981. Research on interviewing techniques. Sociological methodology 12 (1981), 389–437.
[14]
George Chalhoub and Ivan Flechais. 2022. Data Protection at a Discount: Investigating the UX of Data Protection from User, Designer, and Business Leader Perspectives. Proc. ACM Hum.-Comput. Interact. 6, CSCW2, Article 436 (nov 2022), 36 pages. https://doi.org/10.1145/3555537
[15]
George Chalhoub, Ivan Flechais, Norbert Nthala, and Ruba Abu-Salma. 2020. Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). USENIX Association, 185–204. https://www.usenix.org/conference/soups2020/presentation/chalhoub
[16]
George Chalhoub and Advait Sarkar. 2022. “It’s Freedom to Put Things Where My Mind Wants”: Understanding and Improving the User Experience of Structuring Data in Spreadsheets. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (New Orleans, LA, USA) (CHI ’22). Association for Computing Machinery, New York, NY, USA, Article 585, 24 pages. https://doi.org/10.1145/3491102.3501833
[17]
Sonia Chiasson, P. C. van Oorschot, and Robert Biddle. 2007. Even experts deserve usable security: Design guidelines for security management systems. In SOUPS Workshop on Usable IT Security Management (USM). 1–4.
[18]
Jacob Cohen. 1960. A Coefficient of Agreement for Nominal Scales. Educational and Psychological Measurement 20, 1 (April 1960), 37–46. https://doi.org/10.1177/001316446002000104 Publisher: SAGE Publications Inc.
[19]
Juliet Corbin and Anselm Strauss. 2014. Basics of qualitative research: Techniques and procedures for developing grounded theory. Sage publications.
[20]
Olivier Crameri, Nikola Knezevic, Dejan Kostic, Ricardo Bianchini, and Willy Zwaenepoel. 2007. Staged deployment in mirage, an integrated software upgrade testing and distribution system. ACM SIGOPS Operating Systems Review 41, 6 (Oct. 2007), 221–236. https://doi.org/10.1145/1323293.1294283
[21]
Tamara Denning, Tadayoshi Kohno, and Henry M. Levy. 2013. Computer security and the modern home. Commun. ACM 56, 1 (Jan. 2013), 94–103. https://doi.org/10.1145/2398356.2398377
[22]
Tamara Denning, Cynthia Matuszek, Karl Koscher, Joshua R. Smith, and Tadayoshi Kohno. 2009. A spotlight on security and privacy risks with future household robots: attacks and lessons. In Proceedings of the 11th international conference on Ubiquitous computing(UbiComp ’09). Association for Computing Machinery, New York, NY, USA, 105–114. https://doi.org/10.1145/1620545.1620564
[23]
Constanze Dietrich, Katharina Krombholz, Kevin Borgolte, and Tobias Fiebig. 2018. Investigating System Operators’ Perspective on Security Misconfigurations. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security(CCS ’18). Association for Computing Machinery, New York, NY, USA, 1272–1289. https://doi.org/10.1145/3243734.3243794
[24]
Colin Dixon, Ratul Mahajan, Sharad Agarwal, A. J. Brush, Bongshin Lee, Stefan Saroiu, and Paramvir Bahl. 2012. An operating system for the home. In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation(NSDI’12). USENIX Association, USA, 25.
[25]
M. Donner. 2003. Patch management-bits, bad guys, and bucks. Secure Business Quarterly 3, 2 (2003), 1–4.
[26]
Edward G.2022. Record-breaking number of router security flaws discovered in the last few years. https://atlasvpn.com/blog/record-breaking-number-of-router-security-flaws-discovered-in-the-last-few-years
[27]
Anirudh Ekambaranathan, Jun Zhao, and George Chalhoub. 2023. Navigating the Data Avalanche: Towards Supporting Developers in Developing Privacy-Friendly Children’s Apps. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7, 2, Article 53 (jun 2023), 24 pages. https://doi.org/10.1145/3596267
[28]
Gerhard Eschelbeck. 2005. The Laws of Vulnerabilities: Which security vulnerabilities really matter?Information Security Technical Report 10, 4 (2005), 213–219. Publisher: Elsevier.
[29]
Jean Faugier and Mary Sargeant. 1997. Sampling hard to reach populations. Journal of Advanced Nursing 26, 4 (1997), 790–797. https://doi.org/10.1046/j.1365-2648.1997.00371.x
[30]
Earlence Fernandes, Jaeyeon Jung, and Atul Prakash. 2016. Security Analysis of Emerging Smart Home Applications. In 2016 IEEE Symposium on Security and Privacy (SP). 636–654. https://doi.org/10.1109/SP.2016.44 ISSN: 2375-1207.
[31]
Nigel G. Fielding. 2006. The SAGE Dictionary of Social Research Methods. SAGE Publications, Ltd. https://doi.org/10.4135/9780857020116
[32]
Jose Fonseca and Marco Vieira. 2008. Mapping software faults with web security vulnerabilities. In 2008 IEEE international conference on dependable systems and networks With FTCS and DCC (DSN). IEEE, 257–266.
[33]
Leo A. Goodman. 1961. Snowball sampling. The annals of mathematical statistics (1961), 148–170.
[34]
Greg Guest, Arwen Bunce, and Laura Johnson. 2006. How many interviews are enough? An experiment with data saturation and variability. Field methods 18, 1 (2006), 59–82.
[35]
Morey J. Haber and Brad Hibbert. 2018. Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations. Apress. Google-Books-ID: vSpgDwAAQBAJ.
[36]
Nikolai Hampton and Patryk Szewczyk. 2015. A survey and method for analysing SoHo router firmware currency. Australian Information Security Management Conference (Jan. 2015). https://doi.org/10.4225/75/57b697e7d9388
[37]
David Heldenbrand and Christopher Carey. 2007. The Linux router: an inexpensive alternative to commercial routers in the lab. Journal of Computing Sciences in Colleges 23, 1 (Oct. 2007), 127–133.
[38]
Hollie Hennessy. 2021. Millions of people in the UK at risk of using insecure routers - Which? News. https://www.which.co.uk/news/article/millions-of-people-in-the-uk-at-risk-of-using-unsecure-routers-afweT5A8CGNf
[39]
Zhen Huang, David Lie, Gang Tan, and Trent Jaeger. 2019. Using safety properties to generate vulnerability patches. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 539–554.
[40]
John Ioannidis and Steven Michael Bellovin. 2002. Implementing Pushback: Router-Based Defense Against DDoS Attacks. (2002). https://doi.org/10.7916/D8R78MXV
[41]
Jane Wakefield. 2021. Six million Sky routers had serious security flaw. BBC News (Nov. 2021). https://www.bbc.com/news/technology-59332840
[42]
Jose Nazario. 2027. The problem with patching in addressing IoT vulnerabilities. https://www.fastly.com/blog/problem-patching-addressing-iot-vulnerabilities
[43]
Annabel Bhamani Kajornboon. 2005. Using interviews as research instruments. E-journal for Research Teachers 2, 1 (2005), 1–9.
[44]
Eser Kandogan, Paul Maglio, and Eben Haber. 2012. Taming Information Technology: Lessons from Studies of System Administrators. OUP USA. Google-Books-ID: cJ36Q5HDPaYC.
[45]
Emmanouil Karamanos. 2010. Investigation of home router security. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91107
[46]
Kaspersky. 2022. 87 critical vulnerabilities discovered in routers in 2021. https://www.kaspersky.com/about/press-releases/2022_87-critical-vulnerabilities-discovered-in-routers-in-2021 Section: Resource Center.
[47]
Alex J. Kibe. 2018. An Experiment to Determine the Effect of Ethical Hacking on It Administrator’s Patch and Vulnerability Management Attitudes, a Case of a Leading Telecommunications Company. Thesis. university of nairobi. http://erepository.uonbi.ac.ke/handle/11295/104505Accepted: 2019-01-09T05:35:17Z.
[48]
Mike Knight. 2019. Old Routers Are Targets For Hackers. https://reformit.co.uk/old-routers-are-targets-for-hackers/
[49]
Benjamin Koskei and Catherine Simiyu. 2015. Role of interviews, observation, pitfalls and ethical issues in qualitative research methods. Journal of Educational Policy and Entrepreneurial Research 2, 3 (2015), 108–117.
[50]
Sara Kraemer and Pascale Carayon. 2007. Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists. Applied Ergonomics 38, 2 (March 2007), 143–154. https://doi.org/10.1016/j.apergo.2006.03.010
[51]
Katharina Krombholz, Wilfried Mayer, Martin Schmiedecker, and Edgar Weippl. 2017. "I Have No Idea What i’m Doing": On the Usability of Deploying HTTPS. In Proceedings of the 26th USENIX Conference on Security Symposium (Vancouver, BC, Canada) (SEC’17). USENIX Association, USA, 1339–1356.
[52]
Lorenz Kustosch, Carlos Gañán, Mattis van’t Schip, Michel van Eeten, and Simon Parkin. [n. d.]. Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible. ([n. d.]).
[53]
Gurjan Lally and Daniele Sgandurra. 2018. Towards a Framework for Testing the Security of IoT Devices Consistently. In Emerging Technologies for Authorization and Authentication(Lecture Notes in Computer Science), Andrea Saracino and Paolo Mori (Eds.). Springer International Publishing, Cham, 88–102. https://doi.org/10.1007/978-3-030-04372-8_8
[54]
Frank Li and Vern Paxson. 2017. A large-scale empirical study of security patches. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2201–2215.
[55]
Frank Li, Lisa Rogers, Arunesh Mathur, Nathan Malkin, and Marshini Chetty. 2019. Keepers of the machines: Examining how system administrators manage software updates for multiple machines. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). 273–288.
[56]
Richard Lippmann, Seth Webster, and Douglas Stetson. 2002. The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection. In International Workshop on Recent Advances in Intrusion Detection. Springer, 307–326.
[57]
MARIA NAMESTNIKOVA. 2022. Router security report 2021. https://securelist.com/router-security-2021/106711/
[58]
Lynda McGhie. 2003. Software patch management-the new frontier. Secure Business Quarterly 3, 2 (2003), 1–4.
[59]
Huoy Min Khoo and Daniel Robey. 2007. Deciding to upgrade packaged software: a comparative case study of motives, contingencies and dependencies. European Journal of Information Systems 16, 5 (Oct. 2007), 555–567. https://doi.org/10.1057/palgrave.ejis.3000704
[60]
Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, and Gang Wang. 2018. Understanding the reproducibility of crowd-reported security vulnerabilities. In 27th USENIX Security Symposium (USENIX Security 18). 919–936.
[61]
Antonio Nappa, Richard Johnson, Leyla Bilge, Juan Caballero, and Tudor Dumitras. 2015. The attack of the clones: A study of the impact of shared code on vulnerability patching. In 2015 IEEE symposium on security and privacy. IEEE, 692–708.
[62]
Condé Nast. 2023. Your old router is an absolute goldmine for troublesome hackers. Wired UK (Jan. 2023). https://www.wired.co.uk/article/router-wifi-security-settings
[63]
Nathaniel Mott. 2021. Virgin Media Routers Left VPN Users Vulnerable Since at Least 2019. https://uk.pcmag.com/security/135764/virgin-media-routers-left-vpn-users-vulnerable-since-at-least-2019
[64]
South Florida Caribbean News. 2022. Why You Should Replace Your ISP’s Router With A Store-Bought One?https://sflcn.com/why-you-should-replace-your-isp-router-with-a-store-bought-one/
[65]
Tyler Nighswander, Brent Ledvina, Jonathan Diamond, Robert Brumley, and David Brumley. 2012. GPS software attacks. In Proceedings of the 2012 ACM conference on Computer and communications security(CCS ’12). Association for Computing Machinery, New York, NY, USA, 450–461. https://doi.org/10.1145/2382196.2382245
[66]
Adar Ovadya, Rom Ogen, Yakov Mallah, Niv Gilboa, and Yossi Oren. 2019. Cross-Router Covert Channels. In WOOT@ USENIX Security Symposium. https://www.usenix.org/system/files/woot19-paper_ovadia.pdf
[67]
Brigid O’Gorman, Candid Wueest, Dick O’Brien, Gillian Cleary, Hon Lau, John-Paul Power, Mayee Corpin, Orla Cox, Paul Wood, and Scott Wallace. 2019. ISTR Internet Security Threat Report. A Report published by SYMANTEC 24 (Feb. 2019), 32. https://docs.broadcom.com/doc/istr-24-2019-en
[68]
U. K. Parliament. 2022. Product Security and Telecommunications Infrastructure (PSTI) Bill. (2022). https://bills.parliament.uk/bills/3069
[69]
Luana Pascu. 2019. The IoT threat landscape and top smart home vulnerabilities in 2018. Bitdefender (2019). https://www.bitdefender.com/files/News/CaseStudies/study/229/Bitdefender-Whitepaper-The-IoT-Threat-Landscape-and-Top-Smart-Home-Vulnerabilities-in-2018.pdf
[70]
Peter Weidenbach and Johannes vom Dorp. 2020. Home Router Security Report 2020. Fraunhofer Gesellschaft (June 2020). https://www.fkie.fraunhofer.de/content/dam/fkie/de/documents/HomeRouter/HomeRouterSecurity_2020_Bericht.pdf
[71]
Valentina Piantadosi, Simone Scalabrino, and Rocco Oliveto. 2019. Fixing of security vulnerabilities in open source projects: A case study of apache http server and apache tomcat. In 2019 12th IEEE Conference on software testing, validation and verification (ICST). IEEE, 68–78.
[72]
Sam Ransbotham, Sabyaschi Mitra, and Jon Ramsey. 2012. Are markets for vulnerabilities effective?Mis Quarterly (2012), 43–64. Publisher: JSTOR.
[73]
Broadband DSL Routers. 2014. Routers. Westermo (2014). https://rittbul.bg/resources/westermo_pb_100-3870_product_guide-4-24-27.pdf
[74]
Georgia Robins Sadler, Hau-Chen Lee, Rod Seung-Hwan Lim, and Judith Fullerton. 2010. Research Article: Recruitment of hard-to-reach population subgroups via adaptations of the snowball sampling strategy. Nursing & Health Sciences 12, 3 (2010), 369–374. https://doi.org/10.1111/j.1442-2018.2010.00541.x
[75]
Sam Bocetta. 2021. Hackers Targeting Router Devices: Is Your Household Vulnerable?https://www.networkcomputing.com/network-security/hackers-targeting-router-devices-your-household-vulnerable
[76]
Christian Scully and Ping Wang. 2018. Router Security Penetration Testing in a Virtual Environment. In Information Technology - New Generations(Advances in Intelligent Systems and Computing), Shahram Latifi (Ed.). Springer International Publishing, Cham, 119–124. https://doi.org/10.1007/978-3-319-54978-1_16
[77]
Clive Seale. 1999. Quality in qualitative research. Qualitative inquiry 5, 4 (1999), 465–478.
[78]
Youkun Shi, Yuan Zhang, Tianhan Luo, Xiangyu Mao, Yinzhi Cao, Ziwen Wang, Yudi Zhao, Zongan Huang, and Min Yang. 2022. Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches. In 31th USENIX Security Symposium (USENIX Security).
[79]
Silviu Stahie. 2021. Virtual Patching Home Routers Before before Manufacturers Is the Way Forward. https://www.bitdefender.co.uk/blog/hotforsecurity/virtual-patching-home-routers-before-before-manufacturers-is-the-way-forward/
[80]
Anna Kornfeld Simpson, Franziska Roesner, and Tadayoshi Kohno. 2017. Securing vulnerable home IoT devices with an in-hub security manager. In 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). 551–556. https://doi.org/10.1109/PERCOMW.2017.7917622
[81]
Nissy Sombatruang, Tristan Caulfield, Ingolf Becker, Akira Fujita, Takahiro Kasama, Koji Nakao, and Daisuke Inoue. 2023. Internet Service Providers’ and Individuals’ Attitudes, Barriers, and Incentives to Secure IoT. In USENIX Security Symposium. USENIX Association.
[82]
Anselm Strauss and Juliet Corbin. 1998. Basics of qualitative research techniques. Sage publications Thousand Oaks, CA.
[83]
Anselm Strauss and Juliet M. Corbin. 1997. Grounded theory in practice. Sage.
[84]
Suzanne Kernes Dawe. 2022. Lumen discovers new malware that targeted home-office routers for two years. http://news.lumen.com/2022-06-28-Lumen-discovers-new-malware-that-targeted-home-office-routers-for-two-years
[85]
Patryk Szewczyk and Rose Macdonald. 2017. Broadband router security: History, challenges and future implications. Research outputs 2014 to 2021 (Jan. 2017). https://doi.org/10.15394/jdfsl.2017.1444
[86]
Xin Tan, Yuan Zhang, Chenyuan Mi, Jiajun Cao, Kun Sun, Yifan Lin, and Min Yang. 2021. Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. 3282–3299.
[87]
Christian Tiefenau, Maximilian Häring, Katharina Krombholz, and Emanuel Von Zezschwitz. 2020. Security, availability, and multiple information sources: Exploring update behavior of system administrators. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). 239–258.
[88]
Trend Micro. 2018. A Look Into the Most Noteworthy Home Network Security Threats of 2017. https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/a-look-into-the-most-noteworthy-home-network-security-threats-of-2017
[89]
Nicole F. Velasquez and Suzanne P. Weisband. 2008. Work practices of system administrators: implications for tool design. In Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology(CHiMiT ’08). Association for Computing Machinery, New York, NY, USA, 1–10. https://doi.org/10.1145/1477973.1477975
[90]
Nicole F. Velasquez and Suzanne P. Weisband. 2009. System administrators as broker technicians. In Proceedings of the Symposium on Computer Human Interaction for the Management of Information Technology(CHiMiT ’09). Association for Computing Machinery, New York, NY, USA, 1–8. https://doi.org/10.1145/1641587.1641588
[91]
Francesco Vitale, Joanna McGrenere, Aurélien Tabard, Michel Beaudouin-Lafon, and Wendy E. Mackay. 2017. High Costs and Small Benefits: A Field Study of How Users Experience Operating System Upgrades. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems(CHI ’17). Association for Computing Machinery, New York, NY, USA, 4242–4253. https://doi.org/10.1145/3025453.3025509
[92]
Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, and Alf Zugenmaier. 2004. Shield: vulnerability-driven network filters for preventing known vulnerability exploits. ACM SIGCOMM Computer Communication Review 34, 4 (Aug. 2004), 193–204. https://doi.org/10.1145/1030194.1015489
[93]
Zhiqiang Wang, Yuqing Zhang, and Qixu Liu. 2012. A research on vulnerability discovering for router protocols based on fuzzing. In 7th International Conference on Communications and Networking in China. 245–250. https://doi.org/10.1109/ChinaCom.2012.6417484
[94]
Tianlong Yu, Vyas Sekar, Srinivasan Seshan, Yuvraj Agarwal, and Chenren Xu. 2015. Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks(HotNets-XIV). Association for Computing Machinery, New York, NY, USA, 1–7. https://doi.org/10.1145/2834050.2834095

Cited By

View all
  • (2024)A Lightweight Path Validation Scheme in Software-Defined NetworksIEEE INFOCOM 2024 - IEEE Conference on Computer Communications10.1109/INFOCOM52122.2024.10621099(731-740)Online publication date: 20-May-2024

Index Terms

  1. But is it exploitable? Exploring how Router Vendors Manage and Patch Security Vulnerabilities in Consumer-Grade Routers
              Index terms have been assigned to the content through auto-classification.

              Recommendations

              Comments

              Information & Contributors

              Information

              Published In

              cover image ACM Other conferences
              EuroUSEC '23: Proceedings of the 2023 European Symposium on Usable Security
              October 2023
              364 pages
              ISBN:9798400708145
              DOI:10.1145/3617072
              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              Published: 16 October 2023

              Permissions

              Request permissions for this article.

              Check for updates

              Qualifiers

              • Research-article
              • Research
              • Refereed limited

              Funding Sources

              • Secure Networking by Design

              Conference

              EuroUSEC 2023

              Contributors

              Other Metrics

              Bibliometrics & Citations

              Bibliometrics

              Article Metrics

              • Downloads (Last 12 months)112
              • Downloads (Last 6 weeks)9
              Reflects downloads up to 23 Feb 2025

              Other Metrics

              Citations

              Cited By

              View all
              • (2024)A Lightweight Path Validation Scheme in Software-Defined NetworksIEEE INFOCOM 2024 - IEEE Conference on Computer Communications10.1109/INFOCOM52122.2024.10621099(731-740)Online publication date: 20-May-2024

              View Options

              Login options

              View options

              PDF

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader

              HTML Format

              View this article in HTML Format.

              HTML Format

              Figures

              Tables

              Media

              Share

              Share

              Share this Publication link

              Share on social media