2017
DOI: 10.5121/ijcses.2017.8301
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things Malware : A Survey

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 88 publications
1
2
0
Order By: Relevance
“…The IoT denotes a global infrastructure linking digital communication systems to living bodies and institutional power-knowledge ensembles with codified operational standards and formalized (though flexible) rules of engagement enshrined in technoscientific discursive practices. This definition is broadly consistent with Karanja et al's survey of IoT definitions, characterizations, and applications [8]; however, the specific quality of the IoT with which this paper is most concerned is largely absent from those surveyed in [8], since the latter only indirectly capture the quality of the IoT as a "web of weapons" [9, p. 106] in and through which hi-tech cognitive, psychological, informational, biological, and kinetic (including nuclear) wars may be waged. Schneier [10] and, more recently, Dyer-Witheford and Matviyenko [9] and Scharre [11], have more directly elaborated this facet of the IoT.…”
Section: Overview: An Era Of Cognitive Warfare and Biohackingsupporting
confidence: 83%
“…The IoT denotes a global infrastructure linking digital communication systems to living bodies and institutional power-knowledge ensembles with codified operational standards and formalized (though flexible) rules of engagement enshrined in technoscientific discursive practices. This definition is broadly consistent with Karanja et al's survey of IoT definitions, characterizations, and applications [8]; however, the specific quality of the IoT with which this paper is most concerned is largely absent from those surveyed in [8], since the latter only indirectly capture the quality of the IoT as a "web of weapons" [9, p. 106] in and through which hi-tech cognitive, psychological, informational, biological, and kinetic (including nuclear) wars may be waged. Schneier [10] and, more recently, Dyer-Witheford and Matviyenko [9] and Scharre [11], have more directly elaborated this facet of the IoT.…”
Section: Overview: An Era Of Cognitive Warfare and Biohackingsupporting
confidence: 83%
“…Karanja et al [109] focused on surveying general IoT malware characteristics. They elicit the need for IoT benchmark datasets and software tools for completeness in feature extraction attempts.…”
Section: A Surveys On Iot Malware Threat Huntingmentioning
confidence: 99%
“…3) scalability where the network on IoT devices is globally distributed but can be scaled in an application. 4) resource constraints where low energy requirements make the IoT design minimalist, so sensors and actuators limit security [1].…”
Section: Introductionmentioning
confidence: 99%