{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:03:58Z","timestamp":1750309438543,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T00:00:00Z","timestamp":1731974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Spanish Ministry of Science and Innovation","award":["PID2020-118249RB-C22"],"award-info":[{"award-number":["PID2020-118249RB-C22"]}]},{"name":"Spanish Ministry of Science and Innovation","award":["PDC2021-121567-C22 - AEI\/10.13039 \/501100011033"],"award-info":[{"award-number":["PDC2021-121567-C22 - AEI\/10.13039 \/501100011033"]}]},{"name":"Spanish Ministry of Science and Innovation","award":["TED2021-131520B-C22"],"award-info":[{"award-number":["TED2021-131520B-C22"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,19]]},"DOI":"10.1145\/3703790.3703821","type":"proceedings-article","created":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T12:30:00Z","timestamp":1744115400000},"page":"267-272","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Vulnerability Analysis of IoT Platforms: A Case Study on Thinger.io"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7484-7357","authenticated-orcid":false,"given":"Jose","family":"M. Molina","sequence":"first","affiliation":[{"name":"Computer Science and Engineering Department\/Applied Artificial Intelligence Group, Universidad Carlos III de Madrid, Colmenarejo, Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7197-5361","authenticated-orcid":false,"given":"Alvaro","family":"Bustamante","sequence":"additional","affiliation":[{"name":"Thinger.io Engineering Team, Las Rozas, Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9304-826X","authenticated-orcid":false,"given":"Miguel Angel","family":"Patricio","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department\/Applied Artificial Intelligence Group, Universidad Carlos III de Madrid, Colmenarejo, Madrid, Spain"}]}],"member":"320","published-online":{"date-parts":[[2025,3,31]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Lawrence\u00a0Oriaghe Aghenta and Mohammad\u00a0Tariq Iqbal. 2019. Low-cost open source IoT-based SCADA system design using thinger. IO and ESP32 thing. Electronics 8 8 (2019) 822.","DOI":"10.3390\/electronics8080822"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"MA Al\u00a0Naeem A Abubakar and MMH Rahman. 2020. Dealing with well-formed and malformed packets associated with point of failure that cause network security breach. IEEE Access (2020) 9241700.","DOI":"10.1109\/ACCESS.2020.3034383"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"\u00d6zlem Aslan Serkan\u00a0S. Aktu\u011f Merve Ozkan-Okay Ahmet\u00a0A. Yilmaz and Erkan Akin. 2023. A comprehensive review of cyber security vulnerabilities threats attacks and solutions. Electronics 12 6 (2023) 1333.","DOI":"10.3390\/electronics12061333"},{"key":"e_1_3_3_1_5_2","unstructured":"Win\u00a0Sandar Aung and S\u00a0Aung\u00a0Nyein Oo. 2019. Monitoring and controlling device for smart greenhouse by using Thinger. IO IoT server. International Journal of Trend in Scientific Research and Development (2019)."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Roberto Baldoni Emilio Coppa Daniele\u00a0Cono D\u2019elia Camil Demetrescu and Irene Finocchi. 2018. A survey of symbolic execution techniques. ACM Computing Surveys (CSUR) 51 3 (2018) 1\u201339. 10.1145\/3182657","DOI":"10.1145\/3182657"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","unstructured":"A Blasi A Goffi K Kuznetsov and A Gorla. 2018. Translating code comments to procedure specifications. Proceedings of the 2018 ACM SIGSOFT International Symposium on Software Testing and Analysis (2018). 10.1145\/3213846.3213872","DOI":"10.1145\/3213846.3213872"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0024"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Alvaro\u00a0Luis Bustamante Miguel\u00a0A Patricio Antonio Berlanga and Jos\u00e9\u00a0M Molina. 2023. Seamless transition from machine learning on the cloud to industrial edge devices with thinger. io. IEEE Internet of Things Journal 10 18 (2023) 16548\u201316563.","DOI":"10.1109\/JIOT.2023.3268771"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3338502.3359762"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10575-8.pdf"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Abebe Diro Henok Reda Naveen Chilamkurti and Amjad Mahmood. 2020. Lightweight authenticated-encryption scheme for internet of things based on publish-subscribe communication. IEEE (2020). https:\/\/ieeexplore.ieee.org\/abstract\/document\/9045934\/","DOI":"10.1109\/ACCESS.2020.2983117"},{"key":"e_1_3_3_1_13_2","unstructured":"Daniel dos Santos Stanislav Dashevskyi Jos Wetzels and Amine Amri. 2021. Amnesia: 33 How TCP\/IP Stacks Breed Critical Vulnerabilities in IoT OT and IT Devices. Forescout Research Labs (2021)."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","unstructured":"AJ Hintaw S Manickam and MF Aboalmaaly. 2023. MQTT vulnerabilities attack vectors and solutions in the internet of things (IoT). IETE Journal of Research (2023). 10.1080\/03772063.2021.1912651 Cited by 58.","DOI":"10.1080\/03772063.2021.1912651"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"SD Hitefield M Fowler et\u00a0al. 2018. Exploiting buffer overflow vulnerabilities in software defined radios. 2018 IEEE International... (2018).","DOI":"10.1109\/Cybermatics_2018.2018.00318"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3465771"},{"key":"e_1_3_3_1_17_2","unstructured":"Amandeep Kaur and Anand Nayyar. 2020. A comparative study of static code analysis tools for vulnerability detection in C\/C++ and Java source code. Procedia Computer Science 167 (2020) 2020. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050920312023"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","unstructured":"George Klees Anthony Ruef Ben Cooper Shiyi Wei and Michael Hicks. 2018. Evaluating fuzz testing. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (2018) 2123\u20132140. 10.1145\/3243734.3243804","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Sujitha Lakshminarayana Amit Praseed and P\u00a0Santhi Thilagam. 2024. Securing the IoT Application Layer from an MQTT Protocol Perspective: Challenges and Research Prospects. IEEE Communications Surveys & Tutorials (2024).","DOI":"10.1109\/COMST.2024.3372630"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"A Luis\u00a0Bustamante MA Patricio and JM Molina. 2019. Thinger. io: An open source platform for deploying data fusion applications in IoT environments. Sensors 19 5 (2019) 1044.","DOI":"10.3390\/s19051044"},{"key":"e_1_3_3_1_21_2","volume-title":"Web Penetration Testing with Kali Linux: Explore the methods and tools of ethical hacking with Kali Linux","author":"Najera-Gutierrez Gilberto","year":"2018","unstructured":"Gilberto Najera-Gutierrez and Juned\u00a0Ahmed Ansari. 2018. Web Penetration Testing with Kali Linux: Explore the methods and tools of ethical hacking with Kali Linux. Packt Publishing."},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00062"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"E Schiller A Aidoo J Fuhrer J Stahl and M Zi\u00f6rjen. 2022. Landscape of IoT security. Computer Science (2022). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1574013722000120","DOI":"10.1016\/j.cosrev.2022.100467"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Khurram Shafique Bilal\u00a0A Khawaja Fozia Sabir Shoab\u00a0A Qazi and Muhammad Mustaqim. 2020. Internet of things (IoT) for next-generation smart systems: A review of current challenges future trends and prospects for emerging 5G-IoT scenarios. IEEE Access 8 (2020) 23022\u201323040.","DOI":"10.1109\/ACCESS.2020.2970118"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","unstructured":"S Singh PK Sharma SY Moon and JH Park. 2024. Advanced lightweight encryption algorithms for IoT devices: survey challenges and solutions. Journal of Ambient Intelligence and Humanized Computing 15 1 (2024) 123\u2013145. 10.1007\/s12652-017-0494-4","DOI":"10.1007\/s12652-017-0494-4"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"crossref","unstructured":"MM Yamin B Katt and V Gkioulos. 2020. Cyber ranges and security testbeds: Scenarios functions tools and architecture. Computers & Security (2020). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404819301804 Cited by 273.","DOI":"10.1016\/j.cose.2019.101636"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"crossref","unstructured":"Wei Zhou Yiyang Jia Anni Peng Yong Zhang and Peng Liu. 2018. The effect of IoT new features on security and privacy: New threats existing solutions and challenges yet to be solved. IEEE Internet of Things Journal 6 2 (2018) 1606\u20131616.","DOI":"10.1109\/JIOT.2018.2847733"}],"event":{"name":"IoT 2024: 14th International Conference on the Internet of Things","acronym":"IoT 2024","location":"Oulu Finland"},"container-title":["Proceedings of the 14th International Conference on the Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3703790.3703821","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3703790.3703821","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:42Z","timestamp":1750295382000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3703790.3703821"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,19]]},"references-count":26,"alternative-id":["10.1145\/3703790.3703821","10.1145\/3703790"],"URL":"https:\/\/doi.org\/10.1145\/3703790.3703821","relation":{},"subject":[],"published":{"date-parts":[[2024,11,19]]},"assertion":[{"value":"2025-03-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}