Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Code Injection Attacks in Wireless-Based Internet of Things (IoT): A Comprehensive Review and Practical Implementations
by
Noman, Haitham Ameen
, Abu-Sharkh, Osama M. F.
in
attacks
/ code injection
/ Codes
/ Communication
/ Computer software industry
/ cybersecurity
/ Cyberterrorism
/ Data integrity
/ Embedded systems
/ IMECA
/ Internet of Things
/ malicious code
/ Malware
/ Reputations
/ Reverse engineering
/ Review
/ Software
/ Spyware
/ Structured Query Language-SQL
/ Technology application
/ Web applications
/ Wide area networks
/ Wireless networks
2023
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Code Injection Attacks in Wireless-Based Internet of Things (IoT): A Comprehensive Review and Practical Implementations
by
Noman, Haitham Ameen
, Abu-Sharkh, Osama M. F.
in
attacks
/ code injection
/ Codes
/ Communication
/ Computer software industry
/ cybersecurity
/ Cyberterrorism
/ Data integrity
/ Embedded systems
/ IMECA
/ Internet of Things
/ malicious code
/ Malware
/ Reputations
/ Reverse engineering
/ Review
/ Software
/ Spyware
/ Structured Query Language-SQL
/ Technology application
/ Web applications
/ Wide area networks
/ Wireless networks
2023
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Code Injection Attacks in Wireless-Based Internet of Things (IoT): A Comprehensive Review and Practical Implementations
by
Noman, Haitham Ameen
, Abu-Sharkh, Osama M. F.
in
attacks
/ code injection
/ Codes
/ Communication
/ Computer software industry
/ cybersecurity
/ Cyberterrorism
/ Data integrity
/ Embedded systems
/ IMECA
/ Internet of Things
/ malicious code
/ Malware
/ Reputations
/ Reverse engineering
/ Review
/ Software
/ Spyware
/ Structured Query Language-SQL
/ Technology application
/ Web applications
/ Wide area networks
/ Wireless networks
2023
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Code Injection Attacks in Wireless-Based Internet of Things (IoT): A Comprehensive Review and Practical Implementations
Journal Article
Code Injection Attacks in Wireless-Based Internet of Things (IoT): A Comprehensive Review and Practical Implementations
2023
Request Book From Autostore
and Choose the Collection Method
Overview
The Internet of Things (IoT) has transformed various domains in our lives by enabling seamless communication and data exchange between interconnected devices, necessitating robust networking infrastructure. This paper presents a comprehensive analysis of code injection attacks in IoT, focusing on the wireless domain. Code injection attacks exploit security weaknesses in applications or software and can have severe consequences, such as data breaches, financial losses, and denial of service. This paper discusses vulnerabilities in IoT systems and examines how wireless frames in state-of-the-art wireless technologies, which serve IoT applications, are exposed to such attacks. To demonstrate the severity of these threats, we introduce a comprehensive framework illustrating code injection attacks in the wireless domain. Several code injection attacks are performed on Wireless Fidelity (Wi-Fi) devices operating on an embedded system commonly used in IoT applications. Our proof of concept reveals that the victims’ devices become further exposed to a full range of cyber-attacks following a successful severe code injection attack. We also demonstrate three scenarios where malicious codes had been detected inside the firmware of wireless devices used in IoT applications by performing reverse engineering techniques. Criticality analysis is conducted for the implemented and demonstrated attacks using Intrusion Modes and Criticality Analysis (IMECA). By understanding the vulnerabilities and potential consequences of code injection attacks on IoT networks and devices, researchers and practitioners can develop more secure IoT systems and better protect against these emerging threats.
MBRLCatalogueRelatedBooks
Related Items
Related Items
This website uses cookies to ensure you get the best experience on our website.