Simple record

dc.rights.licenseAttribution 4.0 International*
dc.contributor.authorIturbe, Mikel
dc.contributor.otherEceiza Olaizola, Maialen
dc.contributor.otherFlores Barroso, Jose Luis
dc.date.accessioned2021-03-31T10:26:11Z
dc.date.available2021-03-31T10:26:11Z
dc.date.issued2021
dc.identifier.issn2327-4662en
dc.identifier.otherhttps://katalogoa.mondragon.edu/janium-bin/janium_login_opac.pl?find&ficha_no=163261en
dc.identifier.urihttps://hdl.handle.net/20.500.11984/5266
dc.description.abstractWith a growing number of embedded devices that create, transform and send data autonomously at its core, the Internet-of-Things (IoT) is a reality in different sectors such as manufacturing, healthcare or transportation. With this expansion, the IoT is becoming more present in critical environments, where security is paramount. Infamous attacks such as Mirai have shown the insecurity of the devices that power the IoT, as well as the potential of such large-scale attacks. Therefore, it is important to secure these embedded systems that form the backbone of the IoT. However, the particular nature of these devices and their resource constraints mean that the most cost-effective manner of securing these devices is to secure them before they are deployed, by minimizing the number of vulnerabilities they ship. To this end, fuzzing has proved itself as a valuable technique for automated vulnerability finding, where specially crafted inputs are fed to programs in order to trigger vulnerabilities and crash the system. In this survey, we link the world of embedded IoT devices and fuzzing. For this end, we list the particularities of the embedded world as far as security is concerned, we perform a literature review on fuzzing techniques and proposals, studying their applicability to embedded IoT devices and, finally, we present future research directions by pointing out the gaps identified in the review.en
dc.description.sponsorshipGobierno Vascoes
dc.language.isoengen
dc.publisherIEEEen
dc.rights© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.subjectEmbedded Systemsen
dc.subjectfuzzingen
dc.subjectIoTen
dc.subjectsoftware testingen
dc.subjectvulnerabilitiesen
dc.titleFuzzing the Internet of Things: A Review on the Techniques and Challenges for Efficient Vulnerability Discovery in Embedded Systemsen
dcterms.accessRightshttp://purl.org/coar/access_right/c_abf2en
dcterms.sourceIEEE Internet of Things Journal.en
local.contributor.groupAnálisis de datos y ciberseguridades
local.description.peerreviewedtrueen
local.identifier.doihttps://doi.org/10.1109/JIOT.2021.3056179en
local.relation.projectIDGV/Elkartek 2019/KK-2019-00072/CAPV/Segurtasun Integrala Industria Adimentsurako/SENDAIen
local.relation.projectIDGV/Ikertalde Convocatoria 2019-2021/IT1357-19/CAPV/Sistemas Inteligentes para Sistemas Industriales/en
local.relation.projectIDGV/Programa Bikaintek 2019/20-AF-W2-2019-00006/CAPV//en
local.rights.publicationfeeAPCen
local.contributor.otherinstitutionhttps://ror.org/03hp1m080es
local.source.detailsEarly Accessen
oaire.format.mimetypeapplication/pdf
oaire.file$DSPACE\assetstore
oaire.resourceTypehttp://purl.org/coar/resource_type/c_6501en
oaire.versionhttp://purl.org/coar/version/c_ab4af688f83e57aaen


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Simple record

Attribution 4.0 International
Except where otherwise noted, this item's license is described as Attribution 4.0 International