Ethical Hacking for IoT Security: A First Look into Bug Bounty Programs and Responsible Disclosure.
Aaron Yi DingGianluca Limon De JesusMarijn JanssenPublished in: CoRR (2019)
Keyphrases
- security threats
- privacy issues
- security problems
- statistical databases
- key management
- confidential information
- security issues
- penetration testing
- access control
- security requirements
- intrusion detection
- information security
- security analysis
- source code
- inference control
- security vulnerabilities
- management system
- network security
- security mechanisms
- computer networks
- personal information
- privacy concerns
- privacy preserving
- sensitive data
- data security
- information loss
- software systems
- intelligence and security informatics
- security properties
- security policies
- resource constrained
- private information
- rfid tags
- sensitive information
- confidential data
- computer programs