{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T19:58:44Z","timestamp":1769543924876,"version":"3.49.0"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2026,2,1]]},"DOI":"10.1109\/jiot.2025.3641441","type":"journal-article","created":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T18:41:57Z","timestamp":1765219317000},"page":"3965-3987","source":"Crossref","is-referenced-by-count":0,"title":["A Systematic Literature Review on Vulnerability Detection Approaches for IoT Mobile Applications"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9633-4758","authenticated-orcid":false,"given":"Zongo","family":"Meyo","sequence":"first","affiliation":[{"name":"Department of Computer Science and Software Engineering, Concordia University, Montreal, QC, Canada"}]},{"given":"Rodrigo Morales","family":"Alvarado","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering, Concordia University, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1265-053X","authenticated-orcid":false,"given":"Ildiko","family":"Pete","sequence":"additional","affiliation":[{"name":"resides, Z&#xFC;rich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4361-2563","authenticated-orcid":false,"given":"Yann-Ga\u00ebl","family":"Gu\u00e9h\u00e9neuc","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering, Concordia University, Montreal, QC, Canada"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Internet of Things\u2014Definition, Historyexamples, and Privacy Concerns","author":"Pyfer","year":"2025"},{"key":"ref2","volume-title":"Forecast Enterprise Spending on Internet of Things (IoT) Worldwide From 2022 to 2030 (in Billion Us Dollars)","year":"2022"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.techfore.2018.08.015","article-title":"A systematic review of the smart home literature: A user perspective","volume":"138","author":"Marikyan","year":"2019","journal-title":"Technol. Forecasting Social Change"},{"key":"ref4","first-page":"63","article-title":"Detection of premeditated security vulnerabilities in mobile applications","volume-title":"Proc. 18th Eur. Conf. Cyber Warfare Secur.","author":"Brilingait\u0117"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-023-10059-2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/info15100631"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3400286.3418261"},{"key":"ref8","volume-title":"OWASP IoI Ten 10","year":"2024"},{"key":"ref9","volume-title":"OWASP Mobile Application Security","year":"2024"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100467"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2020.106276","article-title":"A systematic literature review on automated log abstraction techniques","volume":"122","author":"El-Masri","year":"2020","journal-title":"Inf. Softw. Technol."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.09.009"},{"key":"ref13","article-title":"Procedures for performing systematic reviews","author":"Kitchenham","year":"2004"},{"key":"ref14","volume-title":"Prisma Statement","year":"2024"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00066"},{"key":"ref16","first-page":"1133","article-title":"Discovering and understanding the security hazards in the interactions between IoT devices, mobile apps, and clouds on smart home platforms","volume-title":"Proc. 28th USENIX Secur. Symp. (USENIX Secur.)","author":"Zhou"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICFST.2017.8210548"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354240"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"ref20","first-page":"147","article-title":"SOTERIA: Automated IoT safety and security analysis","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Celik"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3579856.3595806"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873594"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3191737"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5650245"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/s22020513"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2019.8730685"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10684-2_10"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176334"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0047"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i3.330-366"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/s24175465"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2022.101685"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2023.9010005"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00042"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2877749"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MSN60784.2023.00055"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/s19214777"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SECON55815.2022.9918597"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3183575"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560640"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243820"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44038-1_79"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2015.7107459"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2961918"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23159"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3634737.3657010"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.078"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.007"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2419611"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3416507.3423188"},{"key":"ref52","first-page":"1151","article-title":"Looking from the mirror: Evaluating IoT device security through mobile companion apps","volume-title":"Proc. 28th USENIX Secur. Symp. (USENIX Secur.)","author":"Wang"},{"key":"ref53","volume-title":"OWASP Top 10:2021","year":"2021"},{"key":"ref54","volume-title":"Engineering Village\u2014Search and Discovery Platform To Answer Engineering Questions","year":"2021"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11363065\/11282438.pdf?arnumber=11282438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T06:02:13Z","timestamp":1769493733000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11282438\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,1]]},"references-count":54,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3641441","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,1]]}}}