Publication | Closed Access
Game of Hide-and-Seek: Exposing Hidden Interfaces in Embedded Web Applications of IoT Devices
20
Citations
19
References
2022
Year
Mobile SecurityWeb Of ThingEngineeringInformation SecurityIot CommunicationHidden InterfaceIot SecurityIot SystemWeb SecurityIot ChallengeIot DevicesInternet Of ThingsInternet SecuritySecurity TestingMobile ComputingComputer ScienceExposing Hidden InterfacesData SecurityEmbedded Web ApplicationsVulnerable Hidden InterfacesSecurityTechnology
Recent years have seen increased attacks targeting embedded web applications of IoT devices. An important target of such attacks is the hidden interface of embedded web applications, which employs no protection but exposes security-critical actions and sensitive information to illegitimate users. With the severity and the pervasiveness of this issue, it is crucial to identify the vulnerable hidden interfaces, shed light on best practices and raise public awareness.
| Year | Citations | |
|---|---|---|
Page 1
Page 1