{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T08:56:55Z","timestamp":1773997015223,"version":"3.50.1"},"reference-count":153,"publisher":"MDPI AG","issue":"13","license":[{"start":{"date-parts":[[2023,6,30]],"date-time":"2023-06-30T00:00:00Z","timestamp":1688083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The Internet of Things (IoT) has transformed various domains in our lives by enabling seamless communication and data exchange between interconnected devices, necessitating robust networking infrastructure. This paper presents a comprehensive analysis of code injection attacks in IoT, focusing on the wireless domain. Code injection attacks exploit security weaknesses in applications or software and can have severe consequences, such as data breaches, financial losses, and denial of service. This paper discusses vulnerabilities in IoT systems and examines how wireless frames in state-of-the-art wireless technologies, which serve IoT applications, are exposed to such attacks. To demonstrate the severity of these threats, we introduce a comprehensive framework illustrating code injection attacks in the wireless domain. Several code injection attacks are performed on Wireless Fidelity (Wi-Fi) devices operating on an embedded system commonly used in IoT applications. Our proof of concept reveals that the victims\u2019 devices become further exposed to a full range of cyber-attacks following a successful severe code injection attack. We also demonstrate three scenarios where malicious codes had been detected inside the firmware of wireless devices used in IoT applications by performing reverse engineering techniques. Criticality analysis is conducted for the implemented and demonstrated attacks using Intrusion Modes and Criticality Analysis (IMECA). By understanding the vulnerabilities and potential consequences of code injection attacks on IoT networks and devices, researchers and practitioners can develop more secure IoT systems and better protect against these emerging threats.<\/jats:p>","DOI":"10.3390\/s23136067","type":"journal-article","created":{"date-parts":[[2023,7,3]],"date-time":"2023-07-03T00:53:16Z","timestamp":1688345596000},"page":"6067","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["Code Injection Attacks in Wireless-Based Internet of Things (IoT): A Comprehensive Review and Practical Implementations"],"prefix":"10.3390","volume":"23","author":[{"given":"Haitham Ameen","family":"Noman","sequence":"first","affiliation":[{"name":"Computer Engineering Department, King Abdullah II School of Engineering, Princess Sumaya University for Technology, Amman 11941, Jordan"}]},{"given":"Osama M. F.","family":"Abu-Sharkh","sequence":"additional","affiliation":[{"name":"Computer Engineering Department, King Abdullah II School of Engineering, Princess Sumaya University for Technology, Amman 11941, Jordan"}]}],"member":"1968","published-online":{"date-parts":[[2023,6,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Hassan, R., Qamar, F., Hasan, M.K., Aman, A.H., and Ahmed, A.S. (2020). Internet of things and its applications: A comprehensive survey. Symmetry, 12.","DOI":"10.3390\/sym12101674"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Majid, M., Habib, S., Javed, A.R., Rizwan, M., Srivastava, G., Gadekallu, T.R., and Lin, J.C.-W. (2022). Applications of wireless sensor networks and internet of things frameworks in the industry revolution 4.0: A systematic literature review. Sensors, 22.","DOI":"10.3390\/s22062087"},{"key":"ref_3","unstructured":"M\u00e9nard, A. (2023, June 10). How Can We Recognize the Real Power of the Internet of Things?. Available online: https:\/\/www.mckinsey.com\/capabilities\/mckinsey-digital\/our-insights\/how-can-we-recognize-the-real-power-of-the-internet-of-things."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Pau, G., Chaudet, C., Zhao, D., and Collotta, M. (2018). Next Generation Wireless Technologies for Internet of Things. Sensors, 18.","DOI":"10.3390\/s18010221"},{"key":"ref_5","unstructured":"Mollah, M.B., Zeadally, S., and Azad, M.A. (2020). Encyclopedia of Wireless Networks, Springer."},{"key":"ref_6","unstructured":"(2017). IEEE Standard for Information Technology\u2014Telecommunications and Information Exchange between Systems\u2014Local and Metropolitan Area Networks\u2014Specific Requirements\u2014Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 2: Sub 1 ghz License Exempt Operation (Standard No. IEEE 802.11ah-2016)."},{"key":"ref_7","unstructured":"(2023, June 22). Bluetooth Core Specification Version: 5.4. Available online: https:\/\/www.bluetooth.com\/specifications\/specs\/core-specification-5-4\/."},{"key":"ref_8","unstructured":"(2023, June 22). Zigbee Specification Revision 22 1.0. Available online: https:\/\/csa-iot.org\/wp-content\/uploads\/2022\/01\/docs-05-3474-22-0csg-zigbee-specification-1.pdf."},{"key":"ref_9","unstructured":"(2023, June 22). Thread Specification 1.3.0. Available online: https:\/\/www.threadgroup.org\/support#specifications."},{"key":"ref_10","unstructured":"(2023, June 22). LoRaWAN\u2122 1.1 Specification. Available online: https:\/\/lora-alliance.org\/resource_hub\/lorawan-specification-v1-1\/."},{"key":"ref_11","unstructured":"(2023, June 22). Release 13 Specifications. Available online: https:\/\/www.3gpp.org\/specifications-technologies\/releases\/release-13."},{"key":"ref_12","unstructured":"Dargaoui, S., Azrour, M., El Allaoui, A., Amounas, F., Guezzaz, A., Attou, H., Hazman, C., Benkirane, S., and Bouazza, S.H. (2023). Advanced Technology for Smart Environment and Energy, Springer."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2702","DOI":"10.1109\/COMST.2019.2910750","article-title":"Demystifying IOT security: An exhaustive survey on IOT vulnerabilities and a first empirical look on internet-scale IOT exploitations","volume":"21","author":"Neshenko","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"11224","DOI":"10.1109\/JIOT.2023.3252594","article-title":"Advances in IOT security: Vulnerabilities, enabled Criminal Services, attacks and countermeasures","volume":"10","author":"Siwakoti","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"McDermott, C.D., Majdani, F., and Petrovski, A.V. (2018, January 8\u201313). Botnet detection in the internet of things using Deep learning approaches. Proceedings of the 2018 International Joint Conference on Neural Networks (IJCNN), Rio de Janeiro, RJ, Brazil.","DOI":"10.1109\/IJCNN.2018.8489489"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"101728","DOI":"10.1016\/j.scs.2019.101728","article-title":"Internet of things: Evolution and technologies from a security perspective","volume":"54","author":"Ande","year":"2020","journal-title":"Sustain. Cities Soc."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1284","DOI":"10.1016\/j.jacc.2018.01.023","article-title":"Cybersecurity for cardiac implantable electronic devices: What should you know?","volume":"71","author":"Baranchuk","year":"2018","journal-title":"J. Am. Coll. Cardiol."},{"key":"ref_18","unstructured":"Patel, A.B., Sharma, P.R., and Randhawa, P. (2022). Security and Privacy in Cyberspace, Springer. Blockchain Technologies."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Shah, Y., and Sengupta, S. (2020, January 28\u201331). A survey on classification of cyber-attacks on IOT and IIOT devices. Proceedings of the 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA.","DOI":"10.1109\/UEMCON51285.2020.9298138"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"100420","DOI":"10.1016\/j.iot.2021.100420","article-title":"The challenges of IOT addressing security, ethics, privacy, and laws","volume":"15","author":"Karale","year":"2021","journal-title":"Internet Things"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"101685","DOI":"10.1016\/j.phycom.2022.101685","article-title":"Injection attack detection using machine learning for smart IOT Applications","volume":"52","author":"Gaber","year":"2022","journal-title":"Phys. Commun."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1145\/2103621.2103678","article-title":"Defining code-injection attacks","volume":"47","author":"Ray","year":"2012","journal-title":"ACM SIGPLAN Not."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"e136","DOI":"10.7717\/peerj-cs.136","article-title":"Fatal injection: A survey of modern code injection attack countermeasures","volume":"3","author":"Mitropoulos","year":"2017","journal-title":"Peer J. Comput. Sci."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Hu, J., Zhao, W., and Cui, Y. (2020, January 15\u201317). A survey on SQL injection attacks, detection and prevention. Proceedings of the 12th International Conference on Machine Learning and Computing, Shenzhen, China.","DOI":"10.1145\/3383972.3384028"},{"key":"ref_25","first-page":"139","article-title":"A survey on detection and prevention of cross-site scripting attack","volume":"9","author":"Nithya","year":"2015","journal-title":"Int. J. Secur. Its Appl."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s10207-018-0399-z","article-title":"Commix: Automating Evaluation and exploitation of command injection vulnerabilities in web applications","volume":"18","author":"Stasinopoulos","year":"2018","journal-title":"Int. J. Inf. Secur."},{"key":"ref_27","unstructured":"Xiao, X., Yan, R., Ye, R., Li, Q., Peng, S., and Jiang, Y. (November, January 30). Detection and prevention of code injection attacks on HTML5-based apps. Proceedings of the Third International Conference on Advanced Cloud and Big Data, Yangzhou, China."},{"key":"ref_28","unstructured":"(2023, June 10). OWASP Top 10 Web Application Security Risks. Available online: https:\/\/owasp.org\/www-project-top-ten."},{"key":"ref_29","unstructured":"(2021). IEEE Standard for Information Technology\u2014Telecommunications and Information Exchange between Systems\u2014Local and Metropolitan Area Networks\u2014Specific Requirements\u2014Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (Standard No. IEEE 802.11-2020)."},{"key":"ref_30","unstructured":"(2023, June 10). Raspberry Pi 4 Model B. Available online: https:\/\/www.raspberrypi.com\/products\/raspberry-pi-4-model-b\/."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Abakumov, A., and Kharchenko, V. (2022, January 9\u201311). Combining IMECA analysis and penetration testing to assess the Cybersecurity of Industrial Robotic Systems. Proceedings of the 12th International Conference on Dependable Systems, Services and Technologies (DESSERT), Athens, Greece.","DOI":"10.1109\/DESSERT58054.2022.10018823"},{"key":"ref_32","unstructured":"Security Encyclopedia (2023, June 10). What is the Morris Worm? 5 Things to Know. Available online: https:\/\/www.hypr.com\/security-encyclopedia\/morris-worm."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1023\/A:1012715226170","article-title":"The JavaSeal Mobile Agent Kernel","volume":"4","author":"Bryce","year":"2001","journal-title":"Auton. Agents Multi Agent Syst."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Francillon, A., and Castelluccia, C. (2008, January 27\u201331). Code injection attacks on Harvard-architecture devices. Proceedings of the 15th ACM Conference on Computer and Communications Security, Alexandria, VA, USA.","DOI":"10.1145\/1455770.1455775"},{"key":"ref_35","unstructured":"Paul, B. (2022). ICT Analysis and Applications, Springer."},{"key":"ref_36","unstructured":"Brown, E. (2023, June 10). Linux Still Rules IoT, Says Survey, with Raspbian Leading the Way. Available online: https:\/\/linuxgizmos.com\/linux-still-rules-iot-says-survey-with-raspbian-leading-the-way."},{"key":"ref_37","unstructured":"(2023, June 10). Raspberry Pi OS. Available online: https:\/\/www.raspberrypi.com\/software."},{"key":"ref_38","unstructured":"(2023, June 10). Microsoft Windows OS. Available online: https:\/\/www.microsoft.com\/en-us\/windows."},{"key":"ref_39","unstructured":"(2023, June 10). Ubuntu Core. Available online: https:\/\/ubuntu.com\/core."},{"key":"ref_40","unstructured":"(2023, June 10). OpenWrt Project. Available online: https:\/\/openwrt.org\/."},{"key":"ref_41","unstructured":"(2023, June 10). Yocto Project. Available online: https:\/\/www.yoctoproject.org\/."},{"key":"ref_42","unstructured":"(2023, June 10). Microsoft Windows IoT. Available online: https:\/\/developer.microsoft.com\/en-us\/windows\/iot."},{"key":"ref_43","unstructured":"0xffsec Handbook (2023, June 10). File Inclusion and Path Traversal. Available online: https:\/\/0xffsec.com\/handbook\/web-applications\/file-inclusion-and-path-traversal."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"22170","DOI":"10.1109\/ACCESS.2020.2969780","article-title":"An in-depth benchmarking and evaluation of Phishing Detection Research for Security needs","volume":"8","author":"Baki","year":"2020","journal-title":"IEEE Access"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Nagendran, K., Balaji, S., Raj, B.A., Chanthrika, P., and Amirthaa, R.G. (2020, January 6\u20137). Web application firewall evasion techniques. Proceedings of the 6th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India.","DOI":"10.1109\/ICACCS48705.2020.9074217"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Cho, S., Kim, G., Cho, S., Choi, J., Park, M., and Han, S. (2016, January 11\u201314). Runtime input validation for java web applications using static bytecode instrumentation. Proceedings of the International Conference on Research in Adaptive and Convergent Systems, Odense, Denmark.","DOI":"10.1145\/2987386.2987432"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1233","DOI":"10.32604\/csse.2022.019427","article-title":"Web security: Emerging threats and defense","volume":"40","author":"Mishra","year":"2022","journal-title":"Comput. Syst. Sci. Eng."},{"key":"ref_48","first-page":"189","article-title":"Local and remote file inclusion","volume":"2","author":"Hubczyk","year":"2012","journal-title":"Internet Tech. Dev. Appl."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Kalantari, F., Zaeifi, M., Bao, T., Wang, R., Shoshitaishvili, Y., and Doup\u00e9, A. (2022, January 26\u201328). Context-auditor: Context-sensitive content injection mitigation. Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses, Limassol, Cyprus.","DOI":"10.1145\/3545948.3545992"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Hoffman, D., Wang, H.-Y., Chang, M., and Ly-Gagnon, D. (2009, January 4\u20136). Grammar based testing of HTML injection vulnerabilities in RSS feeds. Proceedings of the Testing: Academic and Industrial Conference\u2014Practice and Research Techniques, Windsor, UK.","DOI":"10.1109\/TAICPART.2009.34"},{"key":"ref_51","unstructured":"Sharif, M.H.U. (2022). Web Attacks Analysis and Mitigation Techniques. Int. J. Eng. Res. Technol., 10\u201312."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Heiderich, M., Frosch, T., Jensen, M., and Holz, T. (2011, January 17\u201321). Crouching tiger\u2014hidden payload. Proceedings of the 18th ACM Conference on Computer and Communications Security, Chicago, IL, USA.","DOI":"10.1145\/2046707.2046735"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Huang, L.-S., Weinberg, Z., Evans, C., and Jackson, C. (2010, January 4\u20138). Protecting browsers from cross-origin CSS attacks. Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, IL, USA.","DOI":"10.1145\/1866307.1866376"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"1477","DOI":"10.1002\/sec.1433","article-title":"JS-san: Defense Mechanism for HTML5-based web applications against javascript code injection vulnerabilities","volume":"9","author":"Gupta","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1109\/TSE.2017.2778711","article-title":"Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications","volume":"45","author":"Jan","year":"2017","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1080\/19393555.2020.1740839","article-title":"A survey and classification of XML based attacks on web applications","volume":"29","author":"Gupta","year":"2020","journal-title":"Inf. Secur. J. A Glob. Perspect."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"120","DOI":"10.18421\/TEM32-04","article-title":"System for Detection of Network Threats based on Classifiers","volume":"3","author":"Demir","year":"2014","journal-title":"TEM J."},{"key":"ref_58","unstructured":"Clarke, J. (2012). SQL Injection Attacks and Defense, Elsevier."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Hlaing, Z.C., and Khaing, M. (2020, January 27\u201328). A detection and prevention technique on SQL injection attacks. Proceedings of the IEEE Conference on Computer Applications (ICCA), Yangon, Myanmar.","DOI":"10.1109\/ICCA49400.2020.9022833"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1080\/19393555.2021.1995537","article-title":"A Systematic Review of Detection and Prevention Techniques of SQL Injection Attacks","volume":"32","author":"Nasereddin","year":"2021","journal-title":"Inf. Secur. J. A Glob. Perspect."},{"key":"ref_61","unstructured":"Rousseau, A. (2017). Hijacking.net to defend powershell. arXiv."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1145\/1111320.1111070","article-title":"The Essence of Command Injection Attacks in Web Applications","volume":"41","author":"Su","year":"2006","journal-title":"ACM SIGPLAN Not."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Wright, C.S. (2007). Taking control, functions to DLL injection. SSRN Electron. J.","DOI":"10.2139\/ssrn.3153492"},{"key":"ref_64","unstructured":"Uitto, J., Rauti, S., M\u00e4kel\u00e4, J.-M., and Lepp\u00e4nen, V. (2015, January 9\u201310). Preventing malicious attacks by diversifying Linux shell commands. Proceedings of the 14th Symposium on Programming Languages and Software Tools (SPLST), Tampere, Finland."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"O\u2019Leary, M. (2019). Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, Apress.","DOI":"10.1007\/978-1-4842-4294-0"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Kawakoya, Y., Iwamura, M., and Itoh, M. (2010, January 19\u201320). Memory behavior-based automatic malware unpacking in Stealth debugging environment. Proceedings of the 5th International Conference on Malicious and Unwanted Software, Nancy, France.","DOI":"10.1109\/MALWARE.2010.5665794"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Shahriar, H., Haddad, H.M., and Bulusu, P. (2016, January 10\u201314). OCL Fault Injection-based detection of LDAP query injection vulnerabilities. Proceedings of the IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), Atlanta, GA, USA.","DOI":"10.1109\/COMPSAC.2016.161"},{"key":"ref_68","unstructured":"Hiesgen, R., Nawrocki, M., Schmidt, T.C., and W\u00e4hlisch, M. (2022). The race to the vulnerable: Measuring the log4j shell incident. arXiv."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Feng, S., and Lubis, M. (2022, January 23\u201324). Defense-in-depth security strategy in LOG4J vulnerability analysis. Proceedings of the International Conference Advancement in Data Science, E-learning and Information Systems (ICADEIS), Bandung, Indonesia.","DOI":"10.1109\/ICADEIS56544.2022.10037384"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"106960","DOI":"10.1016\/j.comnet.2019.106960","article-title":"Cross-site scripting (XSS) attacks and mitigation: A survey","volume":"166","author":"Torres","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Kaur, J., Garg, U., and Bathla, G. (2023). Detection of cross-site scripting (XSS) attacks using Machine Learning Techniques: A Review. Artif. Intell. Rev., 1\u201345.","DOI":"10.1007\/s10462-023-10433-3"},{"key":"ref_72","unstructured":"Zhong, W. (2023, June 10). Command Injection. Available online: https:\/\/owasp.org\/www-community\/attacks\/Command_Injection."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MSEC.2019.2961649","article-title":"Machine learning for web vulnerability detection: The case of cross-site request forgery","volume":"18","author":"Calzavara","year":"2020","journal-title":"IEEE Secur. Priv."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"e60","DOI":"10.1002\/spy2.60","article-title":"cookieArmor: Safeguarding against cross-site request forgery and session hijacking","volume":"2","author":"Sinha","year":"2019","journal-title":"Secur. Priv."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"123","DOI":"10.14419\/ijet.v7i3.13.16337","article-title":"A study of Ajax template injection in web applications","volume":"7","author":"Haque","year":"2018","journal-title":"Int. J. Eng. Technol."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Abdellatif, A., Costa, D., Badran, K., Abdalkareem, R., and Shihab, E. (2020, January 29\u201330). Challenges in chatbot development: A study of stack overflow posts. Proceedings of the 17th International Conference on Mining Software Repositories, Seoul, Republic of Korea.","DOI":"10.1145\/3379597.3387472"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"042100","DOI":"10.1088\/1755-1315\/252\/4\/042100","article-title":"Analysis to heap overflow exploit in Linux with symbolic execution","volume":"252","author":"Huang","year":"2019","journal-title":"Proc. IOP Conf. Ser. Earth Environ. Sci."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Lai, E., and Luo, W. (2020, January 10\u201312). Static analysis of integer overflow of smart contracts in Ethereum. Proceedings of the 4th International Conference on Cryptography, Security and Privacy, Nanjing, China.","DOI":"10.1145\/3377644.3377650"},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Amatov, B., Lehniger, K., and Langendorfer, P. (2022, January 21\u201325). Return-oriented programming gadget catalog for the XTENSA Architecture. Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Pisa, Italy.","DOI":"10.1109\/PerComWorkshops53856.2022.9767489"},{"key":"ref_80","unstructured":"Lehniger, K., and Langendorfer, P. (December, January 30). Through the window: On the exploitability of XTENSA\u2019s register window overflow. Proceedings of the 32nd International Telecommunication Networks and Applications Conference (ITNAC), Wellington, New Zealand."},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Yao, F., Chen, J., and Venkataramani, G. (2013, January 6\u20139). Jop-alarm: Detecting jump-oriented programming-based anomalies in applications. Proceedings of the IEEE 31st International Conference on Computer Design (ICCD), Asheville, NC, USA.","DOI":"10.1109\/ICCD.2013.6657084"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.procs.2019.09.437","article-title":"Exploiting stack-based buffer overflow using modern day techniques","volume":"160","author":"Nicula","year":"2019","journal-title":"Procedia Comput. Sci."},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Shafana, N.J., and Pawar, K. (2021, January 11\u201313). Exploitation analysis of buffer overflow in SL-Mail Server. Proceedings of the Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India.","DOI":"10.1109\/I-SMAC52330.2021.9640767"},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Kilic, F., Kittel, T., and Eckert, C. (2015). Blind format string attacks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer.","DOI":"10.1007\/978-3-319-23802-9_23"},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Han, W., Ren, M., Tian, S., Ding, L., and He, Y. (2011, January 19\u201320). Static analysis of format string vulnerabilities. Proceedings of the First ACIS International Symposium on Software and Network Engineering, Seoul, Republic of Korea.","DOI":"10.1109\/SSNE.2011.9"},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/978-0-387-74390-5_2","article-title":"Vulnerability Analysis for Mail Protocols","volume":"Volume 37","author":"Singh","year":"2008","journal-title":"Vulnerability Analysis and Defense for the Internet: Advances in Information Security"},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Shahriar, H., and Haddad, H. (2016, January 4\u20138). Object injection vulnerability discovery based on latent semantic indexing. Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy.","DOI":"10.1145\/2851613.2851865"},{"key":"ref_88","unstructured":"Park, S., Kim, D., Jana, S., and Son, S. (2022, January 10\u201312). ${FUGIO}: Automatic Exploit Generation for {PHP}$ Object Injection Vulnerabilities. Proceedings of the 31st USENIX Security Symposium (USENIX Security 22), Boston, MA, USA."},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Koutroumpouchos, N., Lavdanis, G., Veroni, E., Ntantogian, C., and Xenakis, C. (2019, January 28\u201330). ObjectMap: Detecting insecure object deserialization. Proceedings of the 23rd Pan-Hellenic Conference on Informatics, Nicosia, Cyprus.","DOI":"10.1145\/3368640.3368680"},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Li, S., Kang, M., Hou, J., and Cao, Y. (2021, January 23\u201328). Detecting node.js prototype pollution vulnerabilities via object lookup analysis. Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Athens, Greece.","DOI":"10.1145\/3468264.3468542"},{"key":"ref_91","unstructured":"Cui, A., Costello, M., and Stolfo, S. (2013, January 24\u201327). When firmware modifications attack: A case study of embedded exploitation. Proceedings of the 20th Annual Network & Distributed System Security Symposium, San Diego, CA, USA."},{"key":"ref_92","unstructured":"Guillen, M.O., Schmidt, D., and Sigl, G. (2016, January 14\u201318). Practical evaluation of code injection in encrypted firmware updates. Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, Germany."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"103067","DOI":"10.1016\/j.cose.2022.103067","article-title":"Penetration testing of connected households","volume":"126","author":"Heiding","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Gupta, A. (2019). The IOT Hacker\u2019s Handbook: A Practical Guide to Hacking the Internet of Things, Apress. [1st ed.].","DOI":"10.1007\/978-1-4842-4300-8"},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Pan, Z., Chen, Y., Chen, Y., Shen, Y., and Li, Y. (2022). Loginjector: Detecting web application log injection vulnerabilities. Appl. Sci., 12.","DOI":"10.3390\/app12157681"},{"key":"ref_96","unstructured":"Shah, J. (2023, June 10). RCE via LFI Log Poisoning\u2014The Death Potion. Available online: https:\/\/shahjerry33.medium.com\/rce-via-lfi-log-poisoning-the-death-potion-c0831cebc16d."},{"key":"ref_97","unstructured":"Singavane, H. (2023, June 10). Converting LFI to RCE via Log Poisoning. Available online: https:\/\/himanshugurjar-10413.medium.com\/rce-via-lfi-log-poisoning-3a33632caf4a."},{"key":"ref_98","unstructured":"Chandel, R. (2023, June 10). SMTP Log Poisoning through LFI to Remote Code Execution. Available online: https:\/\/www.hackingarticles.in\/smtp-log-poisioning-through-lfi-to-remote-code-exceution\/."},{"key":"ref_99","unstructured":"Goyal, S. (2023, June 10). MySQL Log Poisoning through LFI Vulnerability. Available online: https:\/\/secnhack.in\/mysql-log-poisoning-through-lfi-vulnerability."},{"key":"ref_100","unstructured":"Kalpblogger (2023, June 10). Hibernate Query Language (HQL) Injection. Available online: https:\/\/www.varutra.com\/hibernate-query-language-hql-injection."},{"key":"ref_101","unstructured":"Swisskyrepo (2023, June 10). Hibernate Query Language Injection. Available online: https:\/\/github.com\/swisskyrepo\/PayloadsAllTheThings\/blob\/master\/SQL%20Injection\/HQL%20Injection.md."},{"key":"ref_102","unstructured":"Greshake, K., Abdelnabi, S., Mishra, S., Endres, C., Holz, T., and Fritz, M. (2023). More than you\u2019ve asked for: A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models. arXiv."},{"key":"ref_103","unstructured":"Perez, F., and Ribeiro, I. (2022). Ignore Previous Prompt: Attack Techniques For Language Models. arXiv."},{"key":"ref_104","unstructured":"OpenAI (2023, June 10). ChatGPT. Available online: https:\/\/openai.com\/blog\/chatgpt\/."},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"24095","DOI":"10.1109\/ACCESS.2022.3151967","article-title":"Wireless transmissions, propagation and channel modelling for IOT Technologies: Applications and challenges","volume":"10","author":"Alobaidy","year":"2022","journal-title":"IEEE Access"},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Saavedra, E., Mascaraque, L., Calderon, G., del Campo, G., and Santamaria, A. (2022). A universal testbed for IOT wireless technologies: Abstracting latency, error rate and stability from the IOT protocol and hardware platform. Sensors, 22.","DOI":"10.3390\/s22114159"},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/JIOT.2019.2948888","article-title":"A comprehensive survey on internet of things (IOT) toward 5G Wireless Systems","volume":"7","author":"Chettri","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_108","unstructured":"Gast, M.S. (2017). 802.11 Wireless Networks: The Definitive Guide, O\u2019Reilly Media. [2nd ed.]."},{"key":"ref_109","unstructured":"Beard, C., and Stallings, W. (2015). Wireless Communication Networks and Systems, Pearson. [1st ed.]."},{"key":"ref_110","unstructured":"(2023, June 10). TinyURL. Available online: https:\/\/tinyurl.com."},{"key":"ref_111","unstructured":"(2023, June 10). Bitly. Available online: https:\/\/Bitly.com."},{"key":"ref_112","unstructured":"Mohammadbagher, D. (2023, June 10). Transferring Backdoor Payloads with BSSID by Wireless Traffic. Available online: https:\/\/www.linkedin.com\/pulse\/transferring-backdoor-payloads-bssid-wireless-traffic-mohammadbagher\/."},{"key":"ref_113","unstructured":"Heiland, D. (2023, June 10). Practical Exploitation Using a Malicious Service Set Identifier (SSID). Available online: https:\/\/media.blackhat.com\/eu-13\/briefings\/Heiland\/bh-eu-13-practical-exploitation-heiland-slides.pdf."},{"key":"ref_114","unstructured":"(2023, June 22). Bluetooth Core Specification Version: 4.0. Available online: https:\/\/www.bluetooth.com\/specifications\/specs\/core-specification-4-0\/."},{"key":"ref_115","unstructured":"(2020). IEEE Standard for Low-Rate Wireless Networks (Standard No. IEEE 802.15.4-2020)."},{"key":"ref_116","unstructured":"(2023, June 22). ITU-T Y.4480; Low Power Protocol for Wide Area Wireless Networks. Available online: https:\/\/handle.itu.int\/11.1002\/1000\/14818-en?locatt=format:pdf&auth."},{"key":"ref_117","unstructured":"(2023, June 22). Z-Wave Specifications. Available online: https:\/\/z-wavealliance.org\/development-resources-overview\/specification-for-developers\/."},{"key":"ref_118","unstructured":"(2023, June 22). ITU-T G.9959; Short Range Narrow-Band Digital Radiocommunication Transceivers\u2014PHY, MAC, SAR and LLC Layer Specifications. Available online: https:\/\/www.itu.int\/rec\/T-REC-G.9959-201501-I\/en."},{"key":"ref_119","unstructured":"(2023, June 22). ZM3102N Z-Wave Module Datasheet. Available online: https:\/\/media.digikey.com\/pdf\/data%20sheets\/zensys%20pdfs\/zm3102n.pdf."},{"key":"ref_120","unstructured":"(2018). Information Technology\u2014Telecommunications and Information Exchange between Systems\u2014Local and Metropolitan Area Networks\u2014Specific Requirements\u2014Part 15-6: Wireless Body Area Network (Standard No. ISO\/IEC\/IEEE 8802-15-6:2017)."},{"key":"ref_121","unstructured":"(2019). IEEE Standard for Local and Metropolitan Area Networks\u2014Part 15.7: Short-Range Optical Wireless Communications (Standard No. IEEE 802.15.7-2011)."},{"key":"ref_122","unstructured":"(2023, June 22). IEC 62591; Industrial Networks\u2014Wireless Communication Network and Communication Profiles\u2014WirelessHART. Available online: https:\/\/webstore.iec.ch\/publication\/24433."},{"key":"ref_123","unstructured":"(2018). Cards and Security Devices for Personal Identification\u2014Contactless Proximity Objects (Standard No. ISO\/IEC 14443)."},{"key":"ref_124","unstructured":"(2018). Identification Cards\u2014Contactless Integrated Circuit Cards\u2014Vicinity Cards (Standard No. ISO\/IEC 15693)."},{"key":"ref_125","unstructured":"(2021). Information Technology\u2014Radio Frequency Identification for Item Management (Standard No. ISO\/IEC 18000)."},{"key":"ref_126","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MSP.2006.102","article-title":"RFID malware: Truth vs. myth","volume":"4","author":"Rieback","year":"2006","journal-title":"IEEE Secur. Priv."},{"key":"ref_127","unstructured":"(2013). Information Technology\u2014Telecommunications and Information Exchange between Systems\u2014Near Field Communication\u2014Interface and Protocol (NFCIP-1) (Standard No. ISO\/IEC 18092:2013)."},{"key":"ref_128","unstructured":"(1998). Information Technology\u2014Telecommunications and Information Exchange Between Systems\u2014Local and Metropolitan Area Networks\u2014Specific Requirements\u2014Part 2: Logical Link Control (Standard No. ISO\/IEC\/IEEE 8802-2-1998)."},{"key":"ref_129","unstructured":"(2016). Specification of Implementation for Integrated Circuit(s) Cards\u2014Part 4: High Speed Proximity Cards (Standard No. JIS X 6319-4)."},{"key":"ref_130","unstructured":"(2023, June 10). NFC Forum. Available online: https:\/\/nfc-forum.org\/build\/specifications."},{"key":"ref_131","doi-asserted-by":"crossref","unstructured":"Mulliner, C. (2009, January 16\u201319). Vulnerability Analysis and attacks on NFC-enabled mobile phones. Proceedings of the 2009 International Conference on Availability, Reliability and Security, Fukuoka, Japan.","DOI":"10.1109\/ARES.2009.46"},{"key":"ref_132","doi-asserted-by":"crossref","unstructured":"Verdult, R., and Kooman, F. (2011, January 22). Practical attacks on NFC enabled cell phones. Proceedings of the 2011 Third International Workshop on Near Field Communication 2011, Hagenberg, Austria.","DOI":"10.1109\/NFC.2011.16"},{"key":"ref_133","unstructured":"(2023, June 22). Sigfox Connected Objects: Radio Specifications v1.7. Available online: https:\/\/build.sigfox.com\/sigfox-device-radio-specifications."},{"key":"ref_134","unstructured":"Van der Wateren, F. (2008). The Art of Developing WSN Applications with MyriaNed, Technical Report for Chess Company."},{"key":"ref_135","unstructured":"Alliance (2023, June 10). Weightless Specifications. Available online: https:\/\/www.weightless-alliance.org\/technology."},{"key":"ref_136","unstructured":"Ingenu (2023, June 10). RPMA Specifications. Available online: https:\/\/www.ingenu.com\/technology."},{"key":"ref_137","unstructured":"WHDI (2023, June 10). WHDI Specification. Available online: http:\/\/www.whdi.org\/About."},{"key":"ref_138","unstructured":"(2023, June 22). Release 17 Specifications. Available online: https:\/\/www.3gpp.org\/specifications-technologies\/releases\/release-17."},{"key":"ref_139","unstructured":"(2023, June 22). DASH7 Alliance Protocol Specification v1.2. Available online: https:\/\/www.dash7-alliance.org\/product\/dash7-alliance-protocol-specification-v1-2\/."},{"key":"ref_140","unstructured":"(2023, June 22). ETSI EN 300 175-1 V2.8.1. Available online: https:\/\/www.etsi.org\/deliver\/etsi_en\/300100_300199\/30017501\/02.08.01_60\/en_30017501v020801p.pdf."},{"key":"ref_141","unstructured":"Aircrack-ng (2023, June 10). Aircrack-ng. Available online: https:\/\/www.aircrack-ng.org\/doku.php?id=Main."},{"key":"ref_142","unstructured":"Kali (2023, June 10). Kali Linux. Available online: https:\/\/www.kali.org."},{"key":"ref_143","unstructured":"The Browser Exploitation Framework (2023, June 10). BeEF. Available online: https:\/\/beefproject.com."},{"key":"ref_144","unstructured":"ReFirmLabs (2023, June 10). Binwalk. Available online: https:\/\/github.com\/ReFirmLabs\/binwalk."},{"key":"ref_145","unstructured":"The GNU Netcat Project (2023, June 10). Netcat. Available online: https:\/\/netcat.sourceforge.net."},{"key":"ref_146","unstructured":"PortSwigger (2023, June 10). Burp Suite. Available online: https:\/\/portswigger.net\/burp."},{"key":"ref_147","unstructured":"Internet Engineering Task Force (2023, June 10). Telnet Protocol Specification: RFC 854. Available online: https:\/\/datatracker.ietf.org\/doc\/html\/rfc3600."},{"key":"ref_148","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1109\/TETC.2016.2606384","article-title":"A comprehensive study of security of internet-of-things","volume":"5","author":"Mosenia","year":"2017","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_149","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1016\/j.clsr.2017.12.004","article-title":"Avoiding the internet of insecure industrial things","volume":"34","author":"Urquhart","year":"2018","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_150","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1109\/TETC.2017.2764885","article-title":"Detection and threat prioritization of pivoting attacks in large networks","volume":"8","author":"Apruzzese","year":"2020","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_151","doi-asserted-by":"crossref","unstructured":"Kanakogi, K., Washizaki, H., Fukazawa, Y., Ogata, S., Okubo, T., Kato, T., Kanuka, H., Hazeyama, A., and Yoshioka, N. (2021). Tracing CVE vulnerability information to CAPEC attack patterns using natural language processing techniques. Information, 12.","DOI":"10.24251\/HICSS.2021.841"},{"key":"ref_152","unstructured":"(2023, June 10). National Vulnerability Database, Available online: https:\/\/nvd.nist.gov\/."},{"key":"ref_153","doi-asserted-by":"crossref","unstructured":"Kalbo, N., Mirsky, Y., Shabtai, A., and Elovici, Y. (2020). The security of IP-based video surveillance systems. Sensors, 20.","DOI":"10.3390\/s20174806"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/13\/6067\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:04:05Z","timestamp":1760126645000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/13\/6067"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,30]]},"references-count":153,"journal-issue":{"issue":"13","published-online":{"date-parts":[[2023,7]]}},"alternative-id":["s23136067"],"URL":"https:\/\/doi.org\/10.3390\/s23136067","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,30]]}}}