2021
DOI: 10.1016/j.asej.2021.03.026
|View full text |Cite
|
Sign up to set email alerts
|

A survey and taxonomy of program analysis for IoT platforms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 55 publications
0
4
0
Order By: Relevance
“…Several surveys discussed malware detection using different techniques; for example, articles [ 39 , 40 , 41 ] offer a systematic and comprehensive description of machine-learning malware-detection strategies and DL techniques. It offers DL mechanisms categorized by the type of network input, according to the methods used to extract a feature vector representing the executable.…”
Section: Related Work and Research Goalsmentioning
confidence: 99%
See 2 more Smart Citations
“…Several surveys discussed malware detection using different techniques; for example, articles [ 39 , 40 , 41 ] offer a systematic and comprehensive description of machine-learning malware-detection strategies and DL techniques. It offers DL mechanisms categorized by the type of network input, according to the methods used to extract a feature vector representing the executable.…”
Section: Related Work and Research Goalsmentioning
confidence: 99%
“…In [ 5 , 41 ], security and privacy issues are presented in IoT platforms such as Samsung’s SmartThings, Apple’s HomeKit, Open-HAB, Amazon AWS IoT, and Android Things, that motivate program analysis techniques such as model checking, taint analysis, code instrumentation, and symbolic execution).…”
Section: Related Work and Research Goalsmentioning
confidence: 99%
See 1 more Smart Citation
“…This is due to the growth and expansion of the internet, smart mobile telephony, the expansion in Internet of Things (IoTs), and the increased digitization and digitalization. Though these technology penetrations are all positive signals to the global cyber-inclusion, it has come with corresponding increase in cyber risk mainly using malware [3]. Malware (malicious software) and Potentially Unwanted Software (PUS) is a broad term used to describe software with malicious intent that causes harm to computing resources and information systems.…”
Section: Introductionmentioning
confidence: 99%