Skip to main content
Download PDF
- Main
Stealing, Spying, and Abusing: Consequences of Attacks on Internet of Things Devices
Published Web Location
https://doi.org/10.1109/msec.2019.2924167Abstract
We studied the security practices of a diverse set of Internet of Things (IoT) devices with different architectures. We found vulnerabilities that can be exploited to launch novel attacks. The real-world implications of IoT attacks show the risks associated with these new technologies, and can help us articulate the need for better security practices.
Many UC-authored scholarly publications are freely available on this site because of the UC's open access policies. Let us know how this access is important for you.
Main Content
For improved accessibility of PDF content, download the file to your device.
Enter the password to open this PDF file:
File name:
-
File size:
-
Title:
-
Author:
-
Subject:
-
Keywords:
-
Creation Date:
-
Modification Date:
-
Creator:
-
PDF Producer:
-
PDF Version:
-
Page Count:
-
Page Size:
-
Fast Web View:
-
Preparing document for printing…
0%