Exploitation Techniques of IoST Vulnerabilities in Air-Gapped Networks and Security Measures—A Systematic Review
IP cameras and digital video recorders, as part of the Internet of Surveillance Things (IoST) technology, can sometimes allow unauthenticated access to the video feed or management dashboard. These vulnerabilities may result from weak APIs, misconfigurations, or hidden firmware backdoors. What is pa...
Main Authors: | Razi Hamada, Ievgeniia Kuzminykh |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-10-01
|
Series: | Signals |
Subjects: | |
Online Access: | https://www.mdpi.com/2624-6120/4/4/38 |
Similar Items
-
Analysis of Consumer IoT Device Vulnerability Quantification Frameworks
by: Samira A. Baho, et al.
Published: (2023-02-01) -
Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things
by: Marek Janiszewski, et al.
Published: (2021-06-01) -
The Security of IP-Based Video Surveillance Systems
by: Naor Kalbo, et al.
Published: (2020-08-01) -
Automated Vulnerability Discovery and Exploitation in the Internet of Things
by: Zhongru Wang, et al.
Published: (2019-07-01) -
Forensic analysis and security assessment of IoT camera firmware for smart homes
by: Akashdeep Bhardwaj, et al.
Published: (2023-12-01)