{"id":"https://openalex.org/W2962887681","doi":"https://doi.org/10.1109/giots.2019.8766434","title":"Assessment of Buffer Overflow Based Attacks On an IoT Operating System","display_name":"Assessment of Buffer Overflow Based Attacks On an IoT Operating System","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2962887681","doi":"https://doi.org/10.1109/giots.2019.8766434","mag":"2962887681"},"language":"en","primary_location":{"id":"doi:10.1109/giots.2019.8766434","is_oa":false,"landing_page_url":"https://doi.org/10.1109/giots.2019.8766434","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Global IoT Summit (GIoTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077114144","display_name":"Gary L. Mullen","orcid":null},"institutions":[{"id":"https://openalex.org/I42934936","display_name":"Dublin City University","ror":"https://ror.org/04a1a1e81","country_code":"IE","type":"education","lineage":["https://openalex.org/I42934936"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Gary Mullen","raw_affiliation_strings":["Entwine, School of Electronic Engineering, Dublin City University, Ireland"],"affiliations":[{"raw_affiliation_string":"Entwine, School of Electronic Engineering, Dublin City University, Ireland","institution_ids":["https://openalex.org/I42934936"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074320582","display_name":"Liam Meany","orcid":null},"institutions":[{"id":"https://openalex.org/I42934936","display_name":"Dublin City University","ror":"https://ror.org/04a1a1e81","country_code":"IE","type":"education","lineage":["https://openalex.org/I42934936"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Liam Meany","raw_affiliation_strings":["Entwine, School of Electronic Engineering, Dublin City University, Ireland"],"affiliations":[{"raw_affiliation_string":"Entwine, School of Electronic Engineering, Dublin City University, Ireland","institution_ids":["https://openalex.org/I42934936"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5077114144"],"corresponding_institution_ids":["https://openalex.org/I42934936"],"apc_list":null,"apc_paid":null,"fwci":1.6015,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.87843044,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/buffer-overflow","display_name":"Buffer overflow","score":0.7864187955856323},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7354063987731934},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7022314071655273},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6234464645385742},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5626261830329895},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.45394307374954224},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4502068758010864},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4180392622947693},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.32607904076576233},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19220063090324402},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1831468939781189},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1814802885055542}],"concepts":[{"id":"https://openalex.org/C40842320","wikidata":"https://www.wikidata.org/wiki/Q19423","display_name":"Buffer overflow","level":2,"score":0.7864187955856323},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7354063987731934},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7022314071655273},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6234464645385742},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5626261830329895},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.45394307374954224},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4502068758010864},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4180392622947693},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.32607904076576233},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19220063090324402},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1831468939781189},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1814802885055542},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/giots.2019.8766434","is_oa":false,"landing_page_url":"https://doi.org/10.1109/giots.2019.8766434","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Global IoT Summit (GIoTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2023959340","https://openalex.org/W2122906087","https://openalex.org/W2151891225","https://openalex.org/W2365419411","https://openalex.org/W2479612266","https://openalex.org/W2794591470"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2370114625","https://openalex.org/W2947584067","https://openalex.org/W3118510577","https://openalex.org/W2280562859","https://openalex.org/W3157230915","https://openalex.org/W1496728123","https://openalex.org/W2062873522","https://openalex.org/W1756374135","https://openalex.org/W2393340519"],"abstract_inverted_index":{"The":[0,55,132],"vulnerability":[1,69],"of":[2,16,57,67,73,104,115,137],"electronic":[3],"systems":[4],"to":[5,33,70,111,120,139,151],"attacks":[6,74],"from":[7],"hostile":[8],"agents":[9],"over":[10],"the":[11,20,38,51,95,102,105,121],"Internet":[12,56],"is":[13],"a":[14,71,127],"matter":[15],"growing":[17],"concern":[18],"as":[19],"digital":[21],"world":[22],"becomes":[23],"increasingly":[24],"interconnected.":[25],"Many":[26],"countermeasures":[27],"have":[28],"been":[29],"put":[30],"in":[31,109,126,143,157],"place":[32],"address":[34],"these":[35,113,141],"concerns,":[36],"but":[37],"computational":[39],"burden":[40],"they":[41],"impose":[42],"may":[43],"be":[44,149],"excessive":[45],"for":[46,91],"low-power":[47],"devices.":[48],"In":[49],"particular,":[50],"devices":[52,93],"which":[53],"comprise":[54],"Things":[58],"are":[59],"particularly":[60],"vulnerable.":[61],"This":[62],"paper":[63,133],"provides":[64],"numerical":[65],"assessments":[66],"their":[68],"class":[72],"based":[75],"on":[76,82],"triggering":[77],"buffer":[78],"overflows.":[79],"We":[80,100],"focus":[81],"two":[83],"such":[84],"attacks,":[85,116],"namely":[86],"return-to-lib-c":[87],"and":[88,117],"code":[89],"injection,":[90],"IoT":[92,159],"using":[94],"FreeRTOS":[96,110,144],"(V9.0.0)":[97],"operating":[98,160],"system.":[99],"show":[101],"deficiencies":[103],"prevention":[106],"measures":[107],"provided":[108],"prevent":[112],"kinds":[114],"compare":[118],"them":[119],"more":[122],"robust":[123],"mechanisms":[124],"available":[125],"mainstream":[128],"OS":[129],"(Ubuntu":[130],"16.04.1).":[131],"concludes":[134],"with":[135],"suggestions":[136],"how":[138],"mitigate":[140],"vulnerabilities":[142,155],"-":[145],"further":[146],"investigation":[147],"will":[148],"required":[150],"determine":[152],"whether":[153],"similar":[154],"exist":[156],"other":[158],"systems.":[161]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":3}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
