2023
DOI: 10.3390/sym15111978
|View full text |Cite
|
Sign up to set email alerts
|

IoT Vulnerabilities and Attacks: SILEX Malware Case Study

Basem Ibrahim Mukhtar,
Mahmoud Said Elsayed,
Anca D. Jurcut
et al.

Abstract: The Internet of Things (IoT) is rapidly growing and is projected to develop in future years. The IoT connects everything from Closed Circuit Television (CCTV) cameras to medical equipment to smart home appliances to smart automobiles and many more gadgets. Connecting these gadgets is revolutionizing our lives today by offering higher efficiency, better customer service, and more effective goods and services in a variety of industries and sectors. With this anticipated expansion, many challenges arise. Recent r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 28 publications
0
1
0
Order By: Relevance
“…Several factors make IoT devices inherently vulnerable: limited computational power, variations in equipment, software, and communication protocols [21,22,23]. This creates a significant gap between the security demands placed on these devices and their actual defense capabilities [24].…”
Section: Related Workmentioning
confidence: 99%
“…Several factors make IoT devices inherently vulnerable: limited computational power, variations in equipment, software, and communication protocols [21,22,23]. This creates a significant gap between the security demands placed on these devices and their actual defense capabilities [24].…”
Section: Related Workmentioning
confidence: 99%
“…From compromising personal data to disrupting critical infrastructure, the threats posed by undetected malware can lead to significant financial, privacy, and security ramifications. As digital technologies continue to advance and integrate more deeply into various aspects of life, ensuring robust defense mechanisms against such covert cyber threats becomes not just a technical necessity but a cornerstone for maintaining trust and integrity in the digital landscape (Beaman et al 2021;Mukhtar et al 2023).…”
Section: Introductionmentioning
confidence: 99%