Login / Signup
Who Let the Smart Toaster Hack the House? An Investigation into the Security Vulnerabilities of Consumer IoT Devices.
Yang Li
Anna Maria Mandalari
Isabel Straw
Published in:
CoRR (2023)
Keyphrases
</>
security vulnerabilities
smart objects
intrusion detection
dos attacks
everyday objects
penetration testing
mobile devices
management system
security properties
attack graphs
unauthorized access
database systems