Proceedings of the 9th International Conference on Information Systems Security and Privacy 2023
DOI: 10.5220/0011627700003405
|View full text |Cite
|
Sign up to set email alerts
|

Veto: Prohibit Outdated Edge System Software from Booting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…For example, in IoT 2024, 5 124 2020, a vulnerability known as "Ripple20" was discovered, affecting millions of IoT devices across various industries, including edge computing devices. This vulnerability allowed attackers to remotely execute malicious code, potentially leading to data breaches or system compromise [3]. Another notable incident involved the exploitation of a vulnerability in the "Treck" TCP/IP stack, affecting numerous IoT and edge devices.…”
Section: Introductionmentioning
confidence: 99%
“…For example, in IoT 2024, 5 124 2020, a vulnerability known as "Ripple20" was discovered, affecting millions of IoT devices across various industries, including edge computing devices. This vulnerability allowed attackers to remotely execute malicious code, potentially leading to data breaches or system compromise [3]. Another notable incident involved the exploitation of a vulnerability in the "Treck" TCP/IP stack, affecting numerous IoT and edge devices.…”
Section: Introductionmentioning
confidence: 99%