2020
DOI: 10.1007/s10009-020-00592-x
|View full text |Cite
|
Sign up to set email alerts
|

Static analysis for discovering IoT vulnerabilities

Abstract: The Open Web Application Security Project (OWASP), released the “OWASP Top 10 Internet of Things 2018” list of the high-priority security vulnerabilities for IoT systems. The diversity of these vulnerabilities poses a great challenge toward development of a robust solution for their detection and mitigation. In this paper, we discuss the relationship between these vulnerabilities and the ones listed by OWASP Top 10 (focused on Web applications rather than IoT systems), how these vulnerabilities can actually be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 43 publications
(20 citation statements)
references
References 44 publications
(54 reference statements)
0
16
0
Order By: Relevance
“…(i) Weak, guessable, or hardcoded passwords: To get access to a system, a user must utilize credentials that are readily brute-forced, publicly accessible, or impossible to modify [284][285][286]. Credentials that are both hardcoded and integrated into IoT devices constitute a threat to both IT systems and the IoT itself.…”
Section: Vulnerabilities In Iotmentioning
confidence: 99%
“…(i) Weak, guessable, or hardcoded passwords: To get access to a system, a user must utilize credentials that are readily brute-forced, publicly accessible, or impossible to modify [284][285][286]. Credentials that are both hardcoded and integrated into IoT devices constitute a threat to both IT systems and the IoT itself.…”
Section: Vulnerabilities In Iotmentioning
confidence: 99%
“…Various security vulnerabilities are reported in the built-in authentication mechanism in IoT devices such as weak, guessable, or hardcoded passwords, insecure ecosystem interfaces, lack of firmware validation on device, insecure network services, insecure default settings, and so forth [4]. Hence, the built-in mechanism is not reliable.…”
Section: Research Contributionsmentioning
confidence: 99%
“…In an attempt to partially fulfill these requirements, some IoT device manufacturers made IoT device products with built-in authentication mechanism. However, several security vulnerabilities are disclosed in the firmware implementation of authentication in IoT such as weak, guessable, or hardcoded passwords leading to unauthorized access, insecure ecosystem interfaces resulting to lack of authentication/authorization or weak encryption (broken authentication), lack of firmware validation on device, insecure network services, insecure default settings that may allow the operators to modify the configurations, and so on [4]. Hence, the built-in authentication mechanism in IoT Extended author information available on the last page of the article devices is not reliable.…”
Section: Introductionmentioning
confidence: 99%
“…Mamun et al [22] worked on cryptography applicable to IoT by analyzing lightweight symmetric encryption algorithms such as CLEFIA and TRIVIUM. Pietro et al [23] statically analyzed web applications used in IoT. They discussed top 10 vulnerabilities in The Open Web Application Security Project (IoT 2018) and how these can be exploited.…”
Section: Related Workmentioning
confidence: 99%