2022
DOI: 10.1109/jiot.2022.3152364
|View full text |Cite
|
Sign up to set email alerts
|

Firmware Vulnerabilities Homology Detection Based on Clonal Selection Algorithm for IoT Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 34 publications
0
3
0
Order By: Relevance
“…Implementing robust firewalls can help to protect IIoT devices from external intrusions and network attacks [68][69][70]. Firmware and application security is another critical area; as bugs or vulnerabilities in the firmware or software can be exploited by attackers to compromise a device, it is essential that IIoT device manufacturers regularly release firmware and application updates in order to fix known vulnerabilities and protect devices from attacks [71][72][73]. Finally, security awareness and staff training are important aspects of ensuring that end users are aware of security threats and best practices for protecting their devices and data.…”
Section: Background On the Iiotmentioning
confidence: 99%
“…Implementing robust firewalls can help to protect IIoT devices from external intrusions and network attacks [68][69][70]. Firmware and application security is another critical area; as bugs or vulnerabilities in the firmware or software can be exploited by attackers to compromise a device, it is essential that IIoT device manufacturers regularly release firmware and application updates in order to fix known vulnerabilities and protect devices from attacks [71][72][73]. Finally, security awareness and staff training are important aspects of ensuring that end users are aware of security threats and best practices for protecting their devices and data.…”
Section: Background On the Iiotmentioning
confidence: 99%
“…SAST is an invaluable way of assessing the security of IoT but not the only one needed as it is meant to be complementary (but necessary) to the more traditional blackbox techniques used. Black-box methods used for vulnerability detection in IoT systems include, among others, fuzzing, taint-analysis, symbolic execution, homology analysis, and penetration testing [29][30][31][32][33]. In the remainder of this section, we discuss some of the latest scientific work conducted on these methods.…”
Section: Assessing the Security Of Iot Softwarementioning
confidence: 99%
“…He et al [33] propose a homology detection method based on a clonal selection algorithm for detecting vulnerabilities in IoT firmwares. The proposed problem indicates that methods utilizing machine learning for detecting vulnerabilities in IoT firmwares need sample data of firmware vulnerabilities.…”
Section: Assessing the Security Of Iot Softwarementioning
confidence: 99%