{"id":"https://openalex.org/W3118384517","doi":"https://doi.org/10.1109/tetc.2021.3050733","title":"SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine learning","display_name":"SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine learning","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3118384517","doi":"https://doi.org/10.1109/tetc.2021.3050733","mag":"3118384517"},"language":"en","primary_location":{"id":"doi:10.1109/tetc.2021.3050733","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2021.3050733","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2101.02780","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011044654","display_name":"Tanujay Saha","orcid":"https://orcid.org/0000-0002-3711-3426"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tanujay Saha","raw_affiliation_strings":["Electrical Engineering, Princeton University, 6740 Princeton, New Jersey, United States, 08544 (e-mail: tsaha@princeton.edu)"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering, Princeton University, 6740 Princeton, New Jersey, United States, 08544 (e-mail: tsaha@princeton.edu)","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103266643","display_name":"Najwa Aaraj","orcid":"https://orcid.org/0000-0001-6025-9995"},"institutions":[{"id":"https://openalex.org/I4210134341","display_name":"SciTec (United States)","ror":"https://ror.org/03jb0m794","country_code":"US","type":"company","lineage":["https://openalex.org/I4210134341"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Najwa Aaraj","raw_affiliation_strings":["Technology Innovation Institute, UAE (e-mail: naaraj@alumni.princeton.edu)"],"affiliations":[{"raw_affiliation_string":"Technology Innovation Institute, UAE (e-mail: naaraj@alumni.princeton.edu)","institution_ids":["https://openalex.org/I4210134341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016000451","display_name":"Neel Ajjarapu","orcid":null},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Neel Ajjarapu","raw_affiliation_strings":["Electrical Engineering, Princeton University, 6740 Princeton, New Jersey, United States, (e-mail: ajjarapu@princeton.edu)"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering, Princeton University, 6740 Princeton, New Jersey, United States, (e-mail: ajjarapu@princeton.edu)","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086131079","display_name":"Niraj K. Jha","orcid":"https://orcid.org/0000-0002-1539-0369"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Niraj K Jha","raw_affiliation_strings":["Electrical Engineering, Princeton University, Princeton, New Jersey, United States, 08544 (e-mail: jha@princeton.edu)"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering, Princeton University, Princeton, New Jersey, United States, 08544 (e-mail: jha@princeton.edu)","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5011044654"],"corresponding_institution_ids":["https://openalex.org/I20089843"],"apc_list":null,"apc_paid":null,"fwci":5.2325,"has_fulltext":false,"cited_by_count":45,"citation_normalized_percentile":{"value":0.96355949,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8896697759628296},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8476747274398804},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7016563415527344},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.6876545548439026},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.6381592750549316},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.5303474068641663},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.524850606918335},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.4906400740146637},{"id":"https://openalex.org/keywords/smart-objects","display_name":"Smart objects","score":0.44463637471199036},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.29128003120422363},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.24344462156295776}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8896697759628296},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8476747274398804},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7016563415527344},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.6876545548439026},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.6381592750549316},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.5303474068641663},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.524850606918335},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.4906400740146637},{"id":"https://openalex.org/C2780202397","wikidata":"https://www.wikidata.org/wiki/Q2294986","display_name":"Smart objects","level":3,"score":0.44463637471199036},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.29128003120422363},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.24344462156295776},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tetc.2021.3050733","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2021.3050733","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2101.02780","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2101.02780","pdf_url":"https://arxiv.org/pdf/2101.02780","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2101.02780","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2101.02780","pdf_url":"https://arxiv.org/pdf/2101.02780","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/14","score":0.5099999904632568,"display_name":"Life below water"}],"awards":[{"id":"https://openalex.org/G2394306360","display_name":null,"funder_award_id":"CNS-1617628","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":82,"referenced_works":["https://openalex.org/W87635799","https://openalex.org/W119726445","https://openalex.org/W166342712","https://openalex.org/W1543281322","https://openalex.org/W1554891714","https://openalex.org/W1599149671","https://openalex.org/W1607211554","https://openalex.org/W1642161394","https://openalex.org/W1856750239","https://openalex.org/W1954903228","https://openalex.org/W1978779053","https://openalex.org/W1979877030","https://openalex.org/W1988741337","https://openalex.org/W1997741525","https://openalex.org/W2007943387","https://openalex.org/W2029122708","https://openalex.org/W2036823834","https://openalex.org/W2037777662","https://openalex.org/W2038244154","https://openalex.org/W2038819341","https://openalex.org/W2039427951","https://openalex.org/W2076384720","https://openalex.org/W2094557839","https://openalex.org/W2114996745","https://openalex.org/W2116286374","https://openalex.org/W2116374153","https://openalex.org/W2116520617","https://openalex.org/W2117798902","https://openalex.org/W2119811777","https://openalex.org/W2119821739","https://openalex.org/W2129879631","https://openalex.org/W2133467501","https://openalex.org/W2133941447","https://openalex.org/W2134296086","https://openalex.org/W2139487771","https://openalex.org/W2153635508","https://openalex.org/W2157554212","https://openalex.org/W2163509422","https://openalex.org/W2164576874","https://openalex.org/W2170444597","https://openalex.org/W2460773090","https://openalex.org/W2508317201","https://openalex.org/W2521054263","https://openalex.org/W2541767852","https://openalex.org/W2571698453","https://openalex.org/W2579603034","https://openalex.org/W2598784403","https://openalex.org/W2617477098","https://openalex.org/W2759891682","https://openalex.org/W2773861601","https://openalex.org/W2791673752","https://openalex.org/W2799758613","https://openalex.org/W2809595040","https://openalex.org/W2885533908","https://openalex.org/W2890428069","https://openalex.org/W2890774642","https://openalex.org/W2891980516","https://openalex.org/W2892077825","https://openalex.org/W2904129921","https://openalex.org/W2912588808","https://openalex.org/W2923436575","https://openalex.org/W2930542996","https://openalex.org/W2938315635","https://openalex.org/W2955066366","https://openalex.org/W2963311060","https://openalex.org/W2963804058","https://openalex.org/W2964052849","https://openalex.org/W3023496898","https://openalex.org/W3097727600","https://openalex.org/W3122864121","https://openalex.org/W3203827521","https://openalex.org/W4241054193","https://openalex.org/W6603557143","https://openalex.org/W6636895364","https://openalex.org/W6640663528","https://openalex.org/W6676995458","https://openalex.org/W6680035254","https://openalex.org/W6684325336","https://openalex.org/W6684951741","https://openalex.org/W6738548020","https://openalex.org/W6761298871","https://openalex.org/W6778035576"],"related_works":["https://openalex.org/W2958357193","https://openalex.org/W4377108189","https://openalex.org/W2981941102","https://openalex.org/W2908913802","https://openalex.org/W2768554658","https://openalex.org/W4288639227","https://openalex.org/W2069910799","https://openalex.org/W2907149398","https://openalex.org/W3132594723","https://openalex.org/W2589805430"],"abstract_inverted_index":{"Cyber-physical":[0],"systems":[1],"(CPS)":[2],"and":[3,24,55,86,103,114,143,183],"Internet-of-Things":[4],"(IoT)":[5],"devices":[6,15],"are":[7,16,62],"increasingly":[8],"being":[9],"deployed":[10],"across":[11,19],"multiple":[12],"functionalities.":[13],"These":[14],"inherently":[17],"insecure":[18],"their":[20],"comprehensive":[21],"software,":[22],"hardware,":[23],"network":[25,172],"stacks,":[26],"thus":[27],"presenting":[28],"a":[29,129,174,189],"large":[30],"attack":[31,101,112],"surface":[32],"that":[33,109,123],"can":[34,119],"be":[35,120],"exploited":[36],"by":[37],"hackers.":[38],"In":[39],"this":[40,67,93],"article,":[41],"we":[42,187],"present":[43],"an":[44,132,139,152],"innovative":[45],"technique":[46],"for":[47,192],"detecting":[48],"unknown":[49],"system":[50],"vulnerabilities,":[51,54],"manage":[52],"associated":[53],"improve":[56],"incident":[57],"response":[58],"when":[59],"such":[60],"vulnerabilities":[61],"exploited.":[63],"The":[64,135],"novelty":[65],"of":[66,83,95,141,163,169,173,195],"approach":[68],"lies":[69],"in":[70,80,155],"extracting":[71],"intelligence":[72],"from":[73],"known":[74,181],"real-world":[75],"CPS/IoT":[76],"attacks,":[77],"representing":[78],"them":[79],"the":[81,125,156,161,167,170,180],"form":[82],"regular":[84,96],"expressions,":[85],"employing":[87],"machine":[88],"learning":[89],"(ML)":[90],"techniques":[91],"on":[92],"ensemble":[94],"expressions":[97],"to":[98,127,146,166],"generate":[99],"new":[100,111,116],"vectors":[102,113],"security":[104],"vulnerabilities.":[105],"Our":[106],"results":[107],"show":[108],"10":[110],"122":[115],"vulnerability":[117],"exploits":[118],"successfully":[121],"generated":[122],"have":[124],"potential":[126],"exploit":[128],"CPS":[130],"or":[131],"IoT":[133],"ecosystem.":[134],"ML":[136],"methodology":[137],"achieves":[138],"accuracy":[140],"97.4%":[142],"enables":[144],"us":[145],"predict":[147],"these":[148],"attacks":[149,182],"efficiently":[150],"with":[151],"87.2%":[153],"reduction":[154],"search":[157],"space.":[158],"We":[159],"demonstrate":[160],"application":[162],"our":[164],"method":[165],"hacking":[168],"in-vehicle":[171],"connected":[175],"car.":[176],"To":[177],"defend":[178],"against":[179],"possible":[184],"novel":[185],"exploits,":[186],"discuss":[188],"defense":[190],"mechanism":[191],"various":[193],"classes":[194],"attacks.":[196]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":17},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2021-01-18T00:00:00"}
