2020
DOI: 10.1109/access.2020.2964646
|View full text |Cite
|
Sign up to set email alerts
|

Large-Scale IoT Devices Firmware Identification Based on Weak Password

Abstract: The growth of Internet-connected IoT devices brings many security issues, such as DDoS, weak password and embedded malware. The vulnerability analysis is a critical strategy to prevent security issues. Due to technical exclusivity of diverse manufacturers, their firmware is hard to patch timely and respectively. Therefore, the vulnerability of the device is closely related to the device firmware version. The identification of the firmware version is an essential prerequisite for protecting these devices from a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 21 publications
0
9
0
Order By: Relevance
“…Another subject receiving considerable attention within the literature is that of devising techniques to enumerate and identify marketed IoT devices or those that get easily compromised, i.e., identifying their type, and manufacturer [10,[35][36][37], firmware [38], in addition to an overall evaluation of device security for more and less popular IoT devices observed in the wild [39,40]. While some identification techniques may rely on the DNS behavior of IoT devices [41], others rely on their data flows [42,43].…”
Section: Related Workmentioning
confidence: 99%
“…Another subject receiving considerable attention within the literature is that of devising techniques to enumerate and identify marketed IoT devices or those that get easily compromised, i.e., identifying their type, and manufacturer [10,[35][36][37], firmware [38], in addition to an overall evaluation of device security for more and less popular IoT devices observed in the wild [39,40]. While some identification techniques may rely on the DNS behavior of IoT devices [41], others rely on their data flows [42,43].…”
Section: Related Workmentioning
confidence: 99%
“…Footprinting. Dan Yu et al proposed a firmware identification method by analyzing web pages content [17]. e features of the login page of a device is extracted to identify the device type and brand and then use classification and page segmentation to identify the model and firmware version.…”
Section: Firmware Classification By Webmentioning
confidence: 99%
“…d) Difficult identification:So as to be linked with the IoT, the objects are identification [31]. The accessibility to these "armies" of objects, the administration of these ISSN 2250-3153 This publication is licensed under Creative Commons Attribution CC BY.…”
Section: Rq 3: What Are the Security Issues Of Iot That Arementioning
confidence: 99%