2022
DOI: 10.1109/tdsc.2020.3037908
|View full text |Cite
|
Sign up to set email alerts
|

A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 33 publications
(20 citation statements)
references
References 23 publications
0
20
0
Order By: Relevance
“…In this work, we conduct a comprehensive security evaluation on FLV using deepfake, which may raise some ethical concerns. Similar to the previous studies about the security of AI-powered systems [33][34][35], we pay special attention to the legal and ethical boundaries. First, we use open-source datasets to conduct deepfake synthesis and security evaluation, which is a legitimate and common practice in face-related security research [29,36].…”
Section: Ethical Considerationmentioning
confidence: 94%
“…In this work, we conduct a comprehensive security evaluation on FLV using deepfake, which may raise some ethical concerns. Similar to the previous studies about the security of AI-powered systems [33][34][35], we pay special attention to the legal and ethical boundaries. First, we use open-source datasets to conduct deepfake synthesis and security evaluation, which is a legitimate and common practice in face-related security research [29,36].…”
Section: Ethical Considerationmentioning
confidence: 94%
“…Without the source code of IoT firmware, many approaches perform static analysis on the binary image [46]- [52]. For instance, Gemini [50] utilizes a neural network-based approach to detect known vulnerable functions.…”
Section: B Vulnerable Iot Device Analysismentioning
confidence: 99%
“…Using keywords only, the authors [11] searched Shodan for the PLCs; each PLC was found within 19 days of the initial deployment. In 2020, Zhao et al [22] evaluated five popular search engines, including Censys and Shodan, measuring their searching ability (how many devices each engine returns), raw data accuracy (ratio of valid data), response time (how long until a new device is indexed) and the scanning period (time difference between two contiguous scans). They found that Censys and Shodan had similar searching ability, and both are appropriate for users who wish to find newly exposed devices.…”
Section: Related Workmentioning
confidence: 99%
“…They found that Censys and Shodan had similar searching ability, and both are appropriate for users who wish to find newly exposed devices. The authors [22] recommended users who conduct research on recent data to use Shodan.…”
Section: Related Workmentioning
confidence: 99%