Login / Signup

Who Let the Smart Toaster Hack the House? An Investigation into the Security Vulnerabilities of Consumer IoT Devices.

Yang LiAnna Maria MandalariIsabel Straw
Published in: CoRR (2023)
Keyphrases
  • security vulnerabilities
  • smart objects
  • intrusion detection
  • dos attacks
  • everyday objects
  • penetration testing
  • mobile devices
  • management system
  • security properties
  • attack graphs
  • unauthorized access
  • database systems