Toward Automatically Connecting IoT Devices with Vulnerabilities in the Wild
Abstract
References
Index Terms
- Toward Automatically Connecting IoT Devices with Vulnerabilities in the Wild
Recommendations
Fingerprinting IoT Devices Using Latent Physical Side-Channels
The proliferation of low-end low-power internet-of-things (IoT) devices in "smart" environments necessitates secure identification and authentication of these devices via low-overhead fingerprinting methods. Previous work typically utilizes ...
A taxonomy of vulnerabilities in implantable medical devices
SPIMACS '10: Proceedings of the second annual workshop on Security and privacy in medical and home-care systemsOnce the domain of science fiction, devices connecting biological systems with computers have become reality. Security vulnerabilities that might be exploited in such systems by malicious parties or by inadvertent manipulation are also now a reality. ...
Discovering buffer overflow vulnerabilities in the wild: an empirical study
ESEM '14: Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and MeasurementContext: Reporters of security vulnerabilities possess rich information about the security engineering process. Goal: We performed an empirical study on reporters of buffer overflow vulnerabilities to understand the methods and tools used during the ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Transactions on Sensor Networks](/cms/asset/d7f04128-0151-4d29-9034-f6000f7b0042/3618078.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Journal Family
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- National Natural Science Foundation of China
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 328Total Downloads
- Downloads (Last 12 months)328
- Downloads (Last 6 weeks)26
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in