Cargando…

Automated Vulnerability Discovery and Exploitation in the Internet of Things †

Recently, automated software vulnerability detection and exploitation in Internet of Things (IoT) has attracted more and more attention, due to IoT’s fast adoption and high social impact. However, the task is challenging and the solutions are non-trivial: the existing methods have limited effectiven...

Descripción completa

Detalles Bibliográficos
Autores principales: Wang, Zhongru, Zhang, Yuntao, Tian, Zhihong, Ruan, Qiang, Liu, Tong, Wang, Haichen, Liu, Zhehui, Lin, Jiayi, Fang, Binxing, Shi, Wei
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6696294/
https://www.ncbi.nlm.nih.gov/pubmed/31370171
http://dx.doi.org/10.3390/s19153362