Author:
Liu Runhao,Yu Bo,Wang Baosheng,Ye Jianbin
Publisher
Springer International Publishing
Reference28 articles.
1. The 33 vulnerabilities impacting millions of IoT, OT and it devices that present an immediate risk for organizations worldwide. https://www.forescout.com/resources/amnesia33-research-report-executive-summary/
2. The name:wreck vulnerability impacts nearly 100 million IoT devices. https://www.forescout.com/resources/namewreck-breaking-and-fixing-dns-implementations/
3. The attach on smart-ups devices. https://www.theregister.com/2022/03/09/tlstorm_apc_ups_critical_zero_days/
4. Sivakumaran, P., Blasco, J.: argXtract: Deriving IoT security configurations via automated static analysis of stripped arm cortex-m binaries. In: Annual Computer Security Applications Conference, pp. 861–876 (2021)
5. Feng, X., et al.: Snipuzz: Black-box fuzzing of IoT firmware via message snippet inference. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 337–350 (2021)