1. Lionel Sujay Vailshery (2023, March 03). IoT Connected Devices Worldwide 2019–2023. Available online: https://news.sophos.com/en-us/2022/05/04/attacking-emotets-control-flow-flattening/.
2. A large-scale empirical study on the vulnerability of deployed iot devices;Zhao;IEEE Trans. Dependable Secur. Comput.,2020
3. Wang, Q., Ji, S., Tian, Y., Zhang, X., Zhao, B., Kan, Y., Lin, Z., Lin, C., Deng, S., and Liu, A.X. (2021, January 11–13). MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols. Proceedings of the 30th USENIX Security Symposium (USENIX Security 21), Virtual.
4. Iot malware: Comprehensive survey, analysis framework and case studies;Costin;BlackHat USA,2018
5. Luo, Z., Wang, B., Tang, Y., and Xie, W. (2019). Semantic-based representation binary clone detection for cross-architectures in the internet of things. Appl. Sci., 9.