1. SoK: Security Evaluation of Home-Based IoT Deployments
2. Performing systematic literature reviews in software engineering
3. Z. Berkay Celik , Leonardo Babun , Amit Kumar Sikder , Hidayet Aksu , Gang Tan , Patrick D. McDaniel , and A. Selcuk Uluagac . 2018. Sensitive information tracking in commodity IoT . In 27th USENIX security symposium, USENIX security 2018 , baltimore, MD, USA , august 15-17, 2018(USENIX’18), William Enck and Adrienne Porter Felt (Eds.). USENIX Association , 1687–1704. https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-celik.pdf tex.bibsource: dblp computer science bibliography, https://dblp.org tex.biburl: https://dblp.org/rec/conf/uss/CelikBSATMU18.bib tex.timestamp: Mon, 01 Feb 2021 08:43:20 +0100. Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick D. McDaniel, and A. Selcuk Uluagac. 2018. Sensitive information tracking in commodity IoT. In 27th USENIX security symposium, USENIX security 2018, baltimore, MD, USA, august 15-17, 2018(USENIX’18), William Enck and Adrienne Porter Felt (Eds.). USENIX Association, 1687–1704. https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-celik.pdf tex.bibsource: dblp computer science bibliography, https://dblp.org tex.biburl: https://dblp.org/rec/conf/uss/CelikBSATMU18.bib tex.timestamp: Mon, 01 Feb 2021 08:43:20 +0100.
4. Towards Automated Dynamic Analysis for Linux-based Embedded Firmware
5. IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing