Nothing Special   »   [go: up one dir, main page]

loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Rauli Kaksonen ; Kimmo Halunen and Juha Röning

Affiliation: University of Oulu, Oulu, Finland

Keyword(s): IoT, Vulnerabilities, Cyber Security, Information Security, NVD, CVE, CWE, CVSS.

Abstract: The Internet of Things (IoT) is the ecosystem of networked devices encountered in both work and home. IoT security is a great concern and vulnerabilities are reported daily. IoT is mixed into other digital infrastructure both in terms of sharing the same networks and using the same software components. In this paper, we analyze Common Vulnerabilities and Exposures (CVE) entries, including known exploited vulnerabilities, to describe the vulnerabilities in the IoT context. The results indicate that 88% of reported vulnerabilities are relevant to IoT systems. Half of the vulnerabilities are in the backend or frontend systems while 10-20% concern the IoT devices. HTTP servers are the vulnerability hotspots wherever they are located. Software components are used in all IoT subsystems and tracking and updating them is essential for system security. The results can be used to understand where and what kind of vulnerabilities are in IoT systems.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 65.254.225.175

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Kaksonen, R.; Halunen, K. and Röning, J. (2023). Vulnerabilities in IoT Devices, Backends, Applications, and Components. In Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-624-8; ISSN 2184-4356, SciTePress, pages 659-668. DOI: 10.5220/0011784400003405

@conference{icissp23,
author={Rauli Kaksonen. and Kimmo Halunen. and Juha Röning.},
title={Vulnerabilities in IoT Devices, Backends, Applications, and Components},
booktitle={Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP},
year={2023},
pages={659-668},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0011784400003405},
isbn={978-989-758-624-8},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP
TI - Vulnerabilities in IoT Devices, Backends, Applications, and Components
SN - 978-989-758-624-8
IS - 2184-4356
AU - Kaksonen, R.
AU - Halunen, K.
AU - Röning, J.
PY - 2023
SP - 659
EP - 668
DO - 10.5220/0011784400003405
PB - SciTePress

<style> #socialicons>a span { top: 0px; left: -100%; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease-in-out; -o-transition: all 0.3s ease-in-out; -ms-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;} #socialicons>ahover div{left: 0px;} </style>