{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T14:10:20Z","timestamp":1773065420636,"version":"3.50.1"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030004699","type":"print"},{"value":"9783030004705","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00470-5_26","type":"book-chapter","created":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T06:43:19Z","timestamp":1536216199000},"page":"556-576","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Before Toasters Rise Up: A View into the Emerging IoT Threat Landscape"],"prefix":"10.1007","author":[{"given":"Pierre-Antoine","family":"Vervier","sequence":"first","affiliation":[]},{"given":"Yun","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,7]]},"reference":[{"key":"26_CR1","unstructured":"Shodan. https:\/\/www.shodan.io\/"},{"key":"26_CR2","unstructured":"VirusTotal. https:\/\/www.virustotal.com\/"},{"key":"26_CR3","unstructured":"Internet Census (2012). http:\/\/census2012.sourceforge.net\/paper.html"},{"key":"26_CR4","unstructured":"CVE-2016-1555 (2016). https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-1555"},{"key":"26_CR5","unstructured":"CVE-2016-5681 (2017). https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-5681"},{"key":"26_CR6","unstructured":"CVE-2017-17107 (2017). https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-17107"},{"key":"26_CR7","unstructured":"Antonakakis, M., et al.: Understanding the mirai botnet. In: USENIX Security Symposium (2017)"},{"key":"26_CR8","unstructured":"Anubhav, A.: Agile QBot variant adds NbotLoader Netgear Bug in its new update, July 2017. https:\/\/blog.newskysecurity.com\/agile-122bf2f4e2f3"},{"key":"26_CR9","unstructured":"Anubhav, A.: Masuta : Satori creators\u2019 second botnet weaponizes a new router exploit, January 2018. https:\/\/blog.newskysecurity.com\/masuta-satori-creators-second-botnet-weaponizes-a-new-router-exploit-2ddc51cc52a7"},{"key":"26_CR10","unstructured":"Checkpoint: IoTroop Botnet: the full investigation, October 2017. https:\/\/research.checkpoint.com\/iotroop-botnet-full-investigation\/"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Chen, D.D., Woo, M., Brumley, D., Egele, M.: Towards automated dynamic analysis for Linux-based embedded firmware. In: NDSS, February 2016","DOI":"10.14722\/ndss.2016.23415"},{"key":"26_CR12","unstructured":"Costin, A., Zaddach, J., Francillon, A., Balzarotti, D.: A large scale analysis of the security of embedded firmwares. In: USENIX Security Symposium (2014)"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Costin, A., Zarras, A., Francillon, A.: Automated dynamic firmware analysis at scale: a case study on embedded web interfaces. In: ASIACCS, May 2016","DOI":"10.1145\/2897845.2897900"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Cozzi, E., Graziano, M., Fratantonio, Y., Balzarotti, D.: Understanding Linux malware. In: IEEE Symposium on Security and Privacy, May 2018","DOI":"10.1109\/SP.2018.00054"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Cui, A., Stolfo, S.J.: A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan. In: ACSAC, December 2010","DOI":"10.1145\/1920261.1920276"},{"key":"26_CR16","unstructured":"Edwards, S., Profetis, I.: Hajime: analysis of a decentralized internet worm for IoT devices. Rapidity Netw. (2016)"},{"key":"26_CR17","unstructured":"Embedi: enlarge your botnet with: top D-Link routers, September 2017. https:\/\/embedi.com\/blog\/enlarge-your-botnet-top-d-link-routers-dir8xx-d-link-routers-cruisin-bruisin\/"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Guarnizo, J.D., et al.: Siphon: towards scalable high-interaction physical honeypots. In: CPSS, April 2017","DOI":"10.1145\/3055186.3055192"},{"key":"26_CR19","unstructured":"Kim, P.: Pwning the Dlink 850L routers and abusing the MyDlink Cloud protocol, September 2017. https:\/\/pierrekim.github.io\/blog\/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html"},{"key":"26_CR20","unstructured":"Krebs, B.: Who is Anna-Senpai, the Mirai worm author? January 2017. https:\/\/krebsonsecurity.com\/2017\/01\/who-is-anna-senpai-the-mirai-worm-author\/"},{"key":"26_CR21","unstructured":"Kumar, M.: Advanced Malware targeting Internet of the Things and Routers, March 2016. https:\/\/thehackernews.com\/2016\/03\/internet-of-thing-malware.html"},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Leita, C., Mermoud, K., Dacier, M.: Scriptgen: an automated script generation tool for honeyd. In: ACSAC, December 2005","DOI":"10.1109\/CSAC.2005.49"},{"key":"26_CR23","unstructured":"Luo, T., Xu, Z., Jin, X., Jia, Y., Ouyang, X.: IoTCandyJar: towards an intelligent-interaction honeypot for IoT devices. In: Blackhat, USA, July 2017"},{"key":"26_CR24","unstructured":"Offensive Security: D-Link Devices - UPnP SOAP TelnetD command execution (Metasploit), September 2013. https:\/\/www.exploit-db.com\/exploits\/28333\/"},{"key":"26_CR25","unstructured":"Offensive Security: Remote buffer overflow in cookie header, June 2014. https:\/\/www.exploit-db.com\/exploits\/33863\/"},{"key":"26_CR26","unstructured":"Offensive Security: D-Link DIR-890L\/R - Multiple buffer overflow vulnerabilities, November 2015. https:\/\/www.exploit-db.com\/exploits\/38716\/"},{"key":"26_CR27","unstructured":"Offensive Security: Brickcom corporation network cameras - multiple vulnerabilities, April 2016. https:\/\/www.exploit-db.com\/exploits\/39696\/"},{"key":"26_CR28","unstructured":"Offensive Security: Brickcom IP Camera - credentials disclosure, July 2017. https:\/\/www.exploit-db.com\/exploits\/42588\/"},{"key":"26_CR29","unstructured":"Offensive Security: SSD advisory - D-Link 850L multiple vulnerabilities, August 2017. https:\/\/blogs.securiteam.com\/index.php\/archives\/3364"},{"key":"26_CR30","unstructured":"Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: IoTPOT: analysing the rise of IoT compromises. In: WOOT, August 2015"},{"key":"26_CR31","unstructured":"Wang, M., Santillan, J., Kuipers, F.: ThingPot: an interactive IoT honeypot (2017)"},{"key":"26_CR32","doi-asserted-by":"crossref","unstructured":"Zaddach, J., Bruno, L., Francillon, A., Balzarotti, D.: Avatar: a framework to support dynamic security analysis of embedded systems\u2019 firmwares. In: NDSS, February 2014","DOI":"10.14722\/ndss.2014.23229"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00470-5_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T16:39:28Z","timestamp":1571848768000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00470-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030004699","9783030004705"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00470-5_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}