IoT devices are present in many, especially corporate and sensitive, networks and regularly introduce security risks due to slow vendor responses to vulnerabilities and high difficulty of patching. In this paper, we want to evaluate to what extent the development of future risk of IoT devices due to new and unpatched vulnerabilities can be predicted based on historic information. For this analysis, we build on existing prediction algorithms available in the SAFER framework (prophet and ARIMA) which we evaluate by means of a large data-set of vulnerabilities and patches from 793 IoT devices. Our analysis shows that the SAFER framework can predict a correct future risk for 91% of the devices, demonstrating its applicability. We conclude that ...
The Internet-of-Things (IoT) has quickly moved from the realm of hype to reality with estimates of o...
For my honors thesis I have decided to study the security risks associated with the Internet of Thin...
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale....
The introduction of the Internet of Things (IoT), i.e., the interconnection of embedded devices over...
Users of Internet of Things (IoT) devices are often unaware of their security risks and cannot suffi...
In the last decade, we have witnessed an exponential growth in various types of devices (smartphones...
The Internet of Things (IoT) is a term covering a broad array of Internet-connected devices adopted ...
This paper will describe the security vulnerabilities posed by Internet of Things (IoT) devices, and...
The explosive growth of the Internet of Things ecosystem has thrust these devices into the center of...
The internet has become a vital part of peoples everyday life and helped connect the world together....
The rapidly adopted idea of everyday devices being interconnected and controllable from across the g...
Security risk assessment methods have served us well over the last two decades. As the complexity, p...
This article is focused on the economic impact assessment of Internet of Things (IoT) and its associ...
The last two decades have experienced a steady rise in the production and deployment of sensing-and-...
With the recent increase in the adoption of Internet of Things (IoT) technology globally, cybersecur...
The Internet-of-Things (IoT) has quickly moved from the realm of hype to reality with estimates of o...
For my honors thesis I have decided to study the security risks associated with the Internet of Thin...
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale....
The introduction of the Internet of Things (IoT), i.e., the interconnection of embedded devices over...
Users of Internet of Things (IoT) devices are often unaware of their security risks and cannot suffi...
In the last decade, we have witnessed an exponential growth in various types of devices (smartphones...
The Internet of Things (IoT) is a term covering a broad array of Internet-connected devices adopted ...
This paper will describe the security vulnerabilities posed by Internet of Things (IoT) devices, and...
The explosive growth of the Internet of Things ecosystem has thrust these devices into the center of...
The internet has become a vital part of peoples everyday life and helped connect the world together....
The rapidly adopted idea of everyday devices being interconnected and controllable from across the g...
Security risk assessment methods have served us well over the last two decades. As the complexity, p...
This article is focused on the economic impact assessment of Internet of Things (IoT) and its associ...
The last two decades have experienced a steady rise in the production and deployment of sensing-and-...
With the recent increase in the adoption of Internet of Things (IoT) technology globally, cybersecur...
The Internet-of-Things (IoT) has quickly moved from the realm of hype to reality with estimates of o...
For my honors thesis I have decided to study the security risks associated with the Internet of Thin...
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale....