Have a personal or library account? Click to login

Improving Internet of Things Vulnerability Disclosure and Coordination

Open Access
|Jul 2023

References

  1. Arora, A., Krishnan, R, Telang, R, Yang, Y. (2010). An Empirical Analysis of Software Vendors’ Patch Release Behavior: Impact of Vulnerability Disclosure, retrieved at https://pubsonline.informs.org/doi/abs/10.1287/isre.1080.0226
  2. Arora, A,. Xu, H, Telang, R. (2008). Optimal Policy for Software Vulnerability Disclosure, retrieved at https://pubsonline.informs.org/doi/abs/10.1287/mnsc.1070.0771? Journal Code=mnsc
  3. AT&T Internet Security with ActiveArmor, retrieved on Feb 08, 2022 at https://www.att.com/support/article/u-verse-high-speed-internet/KM1399140/
  4. Balan, A. (2021). DEFCON 29 IoT Village - Jay Balan - 5 Years of IoT Vulnerability Research and Countless 0days, retrieved at https://www.youtube.com/watch?v=xUb190HQtjA&t=2254s
  5. Berte, DR. (2018). Defining the IoT, retrieved at https://sciendo.com/pdf/10.2478/picbe-2018-0013
  6. Collela, P. (2021). Ushering in a Better Connected Future, retrieved at https://www.ericsson.com/en/about-us/company-facts/ericsson-worldwide/india/authored-articles/ushering-in-a-better-connected-future
  7. Comcast Advanced Security, retrieved on Feb 08, 2022 at https://www.xfinity.com/learn/internet-service
  8. Daws, R. (2021). Kaspersky: Attacks on IoT devices double in a year retrieved at https://iottechnews.com/news/2021/sep/07/kaspersky-attacks-on-iot-devices-double-in-a-year/
  9. Day, Jeff et al. (2022). Vulnerability Disclosure: Best Practice Guidelines, retrieved at http://www.open-access.bcu.ac.uk/12218/
  10. Ding, A.Y., De Jesus G.L. & Janssen, M. (2019). Ethical Hacking for IoT Security: A First Look into Bug Bounty Programs and Responsible Disclosure
  11. Flynn, JR., Francis J. (2019). Ring LLC Privacy Litigation, as retrieved at https://www.courtlistener.com/docket/16630199/1/orange-v-ring-llc/
  12. Gartner, Inc., (2018). Emerging Technology Analysis: Bug Bounties and Crowdsourced Security Testing.
  13. Google Project Zero Policy and Disclosure, retrieved on Feb 08, 2022 at https://googleprojectzero.blogspot.com/2020/01/policy-and-disclosure-2020-edition.html
  14. ISO.org. (2018). Information technology – Security techniques – Vulnerability disclosure, retrieved at https://www.iso.org/standard/72311.html
  15. Istrate, C. (2020). Bitdefender, THE STATE OF IoT SECURITY IN 2020
  16. Mehraban, S. (2017). Component Lifespan Considerations for Industrial IoT OEMs, retrieved at https://www.lantronix.com/blog/component-lifespan-considerations-for-industrial-iot-oems/
  17. Netgear Armor, retrieved on Feb 08, 2022 at https://www.netgear.com/home/services/armor/
  18. OECD. (2021).Teleworking in the COVID-19 Pandemic: Trends and Prospects, retrieved at https://read.oecd-ilibrary.org/view/?ref=1108_1108540-p249kho0iu&title=Teleworkingin-the-COVID-19-pandemic-Trends-and-prospects
  19. Routley, N. (2020). 6 charts that show what employers and employees really think about remote working, retrieved at https://www.weforum.org/agenda/2020/06/coronavirus-covid19-remote-working-office-employees-employers
  20. Stahie, S. (2020). Mozi Botnet Accounts for Most Traffic in Q1 2020, New Research Shows, retrieved at https://www.bitdefender.com/blog/hotforsecurity/mozi-botnet-accounts-traffic-q1-2020-new-research-shows
  21. Todor, R. (2021). Bitdefender, THE STATE OF SMART HOME SECURITY IN 2021 AND BEYOND
  22. White, C., Barrett, J., (2022), Data Privacy and Security in the Connected Home, retrieved at https://www.parksassociates.com/marketfocus/data-privacy
Language: English
Page range: 959 - 968
Published on: Jul 14, 2023
Published by: Bucharest University of Economic Studies
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2023 Dan-Radu Berte, published by Bucharest University of Economic Studies
This work is licensed under the Creative Commons Attribution 4.0 License.