1. Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations
2. O. Alrawi , C. Lever , M. Antonakakis , and F. Monrose . SoK: Security Evaluation of Home-Based IoT Deployments. IEEE Symp. on Security and Privacy , May 2019 . O. Alrawi, C. Lever, M. Antonakakis, and F. Monrose. SoK: Security Evaluation of Home-Based IoT Deployments. IEEE Symp. on Security and Privacy, May 2019.
3. O. Alrawi , C. Lever , K. Valakuzhy , R. Court , K. Snow , F. Monrose , and M. Antonakakis . The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle. USENIX Security Symp. , 2021 . O. Alrawi, C. Lever, K. Valakuzhy, R. Court, K. Snow, F. Monrose, and M. Antonakakis. The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle. USENIX Security Symp., 2021.
4. Discovering IoT Physical Channel Vulnerabilities
5. M. Antonakakis , T. April , M. Bailey , M. Bernhard , E. Bursztein , J. Cochran , Z. Durumeric , J. A. Halderman , L. Invernizzi , M. Kallitsis , Understanding the Mirai Botnet. USENIX Security Symp. , 2017 . M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi, M. Kallitsis, et al. Understanding the Mirai Botnet. USENIX Security Symp., 2017.