{"id":"https://openalex.org/W4391099804","doi":"https://doi.org/10.3390/s24020708","title":"A Review of IoT Firmware Vulnerabilities and Auditing Techniques","display_name":"A Review of IoT Firmware Vulnerabilities and Auditing Techniques","publication_year":2024,"publication_date":"2024-01-22","ids":{"openalex":"https://openalex.org/W4391099804","doi":"https://doi.org/10.3390/s24020708","pmid":"https://pubmed.ncbi.nlm.nih.gov/38276399"},"language":"en","primary_location":{"id":"doi:10.3390/s24020708","is_oa":true,"landing_page_url":"https://doi.org/10.3390/s24020708","pdf_url":"https://www.mdpi.com/1424-8220/24/2/708/pdf?version=1705934721","source":{"id":"https://openalex.org/S101949793","display_name":"Sensors","issn_l":"1424-8220","issn":["1424-8220"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Sensors","raw_type":"journal-article"},"type":"review","indexed_in":["crossref","doaj","pubmed"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1424-8220/24/2/708/pdf?version=1705934721","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079692899","display_name":"Taimur Bakhshi","orcid":"https://orcid.org/0000-0003-4750-7864"},"institutions":[{"id":"https://openalex.org/I201384688","display_name":"National University of Computer and Emerging Sciences","ror":"https://ror.org/003eyb898","country_code":"PK","type":"education","lineage":["https://openalex.org/I201384688"]},{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB","PK"],"is_corresponding":true,"raw_author_name":"Taimur Bakhshi","raw_affiliation_strings":["Center for Information Management & Cyber Security, National University of Computer & Emerging Sciences, Lahore 54770, Pakistan","School of Engineering, Computing and Mathematics, University of Plymouth, Plymouth PL4 8AA, UK"],"affiliations":[{"raw_affiliation_string":"Center for Information Management & Cyber Security, National University of Computer & Emerging Sciences, Lahore 54770, Pakistan","institution_ids":["https://openalex.org/I201384688"]},{"raw_affiliation_string":"School of Engineering, Computing and Mathematics, University of Plymouth, Plymouth PL4 8AA, UK","institution_ids":["https://openalex.org/I897542642"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044709278","display_name":"Bogdan Ghita","orcid":"https://orcid.org/0000-0002-1788-547X"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Bogdan Ghita","raw_affiliation_strings":["School of Engineering, Computing and Mathematics, University of Plymouth, Plymouth PL4 8AA, UK"],"affiliations":[{"raw_affiliation_string":"School of Engineering, Computing and Mathematics, University of Plymouth, Plymouth PL4 8AA, UK","institution_ids":["https://openalex.org/I897542642"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010458580","display_name":"Ievgeniia Kuzminykh","orcid":"https://orcid.org/0000-0001-6917-4234"},"institutions":[{"id":"https://openalex.org/I183935753","display_name":"King's College London","ror":"https://ror.org/0220mzb33","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I183935753"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ievgeniia Kuzminykh","raw_affiliation_strings":["Department of Informatics, King\u2019s College London, London WC2R 2ND, UK","Department of Informatics, King's College London, London WC2R 2ND, UK"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, King\u2019s College London, London WC2R 2ND, UK","institution_ids":["https://openalex.org/I183935753"]},{"raw_affiliation_string":"Department of Informatics, King's College London, London WC2R 2ND, UK","institution_ids":["https://openalex.org/I183935753"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5079692899"],"corresponding_institution_ids":["https://openalex.org/I201384688","https://openalex.org/I897542642"],"apc_list":{"value":2400,"currency":"CHF","value_usd":2598},"apc_paid":{"value":2400,"currency":"CHF","value_usd":2598},"fwci":20.325,"has_fulltext":true,"cited_by_count":58,"citation_normalized_percentile":{"value":0.99692291,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"24","issue":"2","first_page":"708","last_page":"708"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.9014771580696106},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6821024417877197},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5231388807296753},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.5054550170898438},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.47727054357528687},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.4175841212272644},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4163425862789154},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3008151948451996},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.10891285538673401},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10610249638557434},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09188616275787354}],"concepts":[{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.9014771580696106},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6821024417877197},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5231388807296753},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.5054550170898438},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.47727054357528687},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.4175841212272644},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4163425862789154},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3008151948451996},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.10891285538673401},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10610249638557434},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09188616275787354},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.3390/s24020708","is_oa":true,"landing_page_url":"https://doi.org/10.3390/s24020708","pdf_url":"https://www.mdpi.com/1424-8220/24/2/708/pdf?version=1705934721","source":{"id":"https://openalex.org/S101949793","display_name":"Sensors","issn_l":"1424-8220","issn":["1424-8220"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Sensors","raw_type":"journal-article"},{"id":"pmid:38276399","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/38276399","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Sensors (Basel, Switzerland)","raw_type":null},{"id":"pmh:oai:kclpure.kcl.ac.uk:openaire/6c60d456-75c6-43c0-8849-2f92317c045e","is_oa":true,"landing_page_url":"https://kclpure.kcl.ac.uk/portal/en/publications/6c60d456-75c6-43c0-8849-2f92317c045e","pdf_url":"https://kclpure.kcl.ac.uk/ws/files/359913951/sensors-24-00708-v2.pdf","source":{"id":"https://openalex.org/S4306400216","display_name":"Research Portal (King's College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I183935753","host_organization_name":"King's College London","host_organization_lineage":["https://openalex.org/I183935753"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Bakhshi, T, Ghita, B & Kuzminykh, I 2024, 'A Review of IoT Firmware Vulnerabilities and Auditing Techniques', SENSORS, vol. 24, no. 2, 708. https://doi.org/10.3390/s24020708","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pubmedcentral.nih.gov:10821153","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/10821153","pdf_url":"https://pmc.ncbi.nlm.nih.gov/articles/PMC10821153/pdf/sensors-24-00708.pdf","source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Sensors (Basel)","raw_type":"Text"},{"id":"pmh:oai:doaj.org/article:f57a282fe7ab4e2d80befebf9dcb6e4c","is_oa":true,"landing_page_url":"https://doaj.org/article/f57a282fe7ab4e2d80befebf9dcb6e4c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Sensors, Vol 24, Iss 2, p 708 (2024)","raw_type":"article"},{"id":"pmh:oai:kclpure.kcl.ac.uk:publications/6c60d456-75c6-43c0-8849-2f92317c045e","is_oa":true,"landing_page_url":"https://kclpure.kcl.ac.uk/portal/files/359913951/sensors-24-00708-v2.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400216","display_name":"Research Portal (King's College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I183935753","host_organization_name":"King's College London","host_organization_lineage":["https://openalex.org/I183935753"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Bakhshi, T, Ghita, B & Kuzminykh, I 2024, 'A Review of IoT Firmware Vulnerabilities and Auditing Techniques', SENSORS, vol. 24, no. 2, 708. https://doi.org/10.3390/s24020708","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.3390/s24020708","is_oa":true,"landing_page_url":"https://doi.org/10.3390/s24020708","pdf_url":"https://www.mdpi.com/1424-8220/24/2/708/pdf?version=1705934721","source":{"id":"https://openalex.org/S101949793","display_name":"Sensors","issn_l":"1424-8220","issn":["1424-8220"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Sensors","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4391099804.pdf"},"referenced_works_count":116,"referenced_works":["https://openalex.org/W144216357","https://openalex.org/W1694077306","https://openalex.org/W1710734607","https://openalex.org/W1931817051","https://openalex.org/W1987272921","https://openalex.org/W2043118292","https://openalex.org/W2051435183","https://openalex.org/W2066220442","https://openalex.org/W2091939272","https://openalex.org/W2127671294","https://openalex.org/W2135274013","https://openalex.org/W2152605584","https://openalex.org/W2158297335","https://openalex.org/W2160349166","https://openalex.org/W2180277119","https://openalex.org/W2195752095","https://openalex.org/W2212111137","https://openalex.org/W2271061078","https://openalex.org/W2345299181","https://openalex.org/W2388447476","https://openalex.org/W2398484989","https://openalex.org/W2401503174","https://openalex.org/W2519293460","https://openalex.org/W2532962075","https://openalex.org/W2534101229","https://openalex.org/W2541711310","https://openalex.org/W2556545483","https://openalex.org/W2576376563","https://openalex.org/W2586432806","https://openalex.org/W2611509061","https://openalex.org/W2612609776","https://openalex.org/W2612798110","https://openalex.org/W2621241666","https://openalex.org/W2627093154","https://openalex.org/W2733765803","https://openalex.org/W2742431158","https://openalex.org/W2744908908","https://openalex.org/W2749008552","https://openalex.org/W2753395445","https://openalex.org/W2758407124","https://openalex.org/W2768152971","https://openalex.org/W2783422090","https://openalex.org/W2791018263","https://openalex.org/W2794563095","https://openalex.org/W2794631344","https://openalex.org/W2799708000","https://openalex.org/W2800623358","https://openalex.org/W2805626176","https://openalex.org/W2882992559","https://openalex.org/W2883039848","https://openalex.org/W2895400994","https://openalex.org/W2897514040","https://openalex.org/W2897864851","https://openalex.org/W2900640554","https://openalex.org/W2900831546","https://openalex.org/W2910153088","https://openalex.org/W2913096406","https://openalex.org/W2913816431","https://openalex.org/W2918917449","https://openalex.org/W2947506247","https://openalex.org/W2949827556","https://openalex.org/W2960294712","https://openalex.org/W2965717902","https://openalex.org/W2966065488","https://openalex.org/W2967100751","https://openalex.org/W2967547550","https://openalex.org/W2969468102","https://openalex.org/W2972481639","https://openalex.org/W2972538216","https://openalex.org/W2972636986","https://openalex.org/W2977770803","https://openalex.org/W2982374693","https://openalex.org/W2984589025","https://openalex.org/W2997466457","https://openalex.org/W2998286398","https://openalex.org/W2998876772","https://openalex.org/W3004663645","https://openalex.org/W3006130050","https://openalex.org/W3006477812","https://openalex.org/W3009219618","https://openalex.org/W3010413952","https://openalex.org/W3018354080","https://openalex.org/W3029172965","https://openalex.org/W3046848477","https://openalex.org/W3048512654","https://openalex.org/W3089804179","https://openalex.org/W3105926539","https://openalex.org/W3112690175","https://openalex.org/W3113108440","https://openalex.org/W3118594333","https://openalex.org/W3118666763","https://openalex.org/W3132858024","https://openalex.org/W3154093559","https://openalex.org/W3158006664","https://openalex.org/W3175402960","https://openalex.org/W3177095755","https://openalex.org/W4206515160","https://openalex.org/W4210545770","https://openalex.org/W4213285181","https://openalex.org/W4225632604","https://openalex.org/W4244720976","https://openalex.org/W4245409806","https://openalex.org/W4250645780","https://openalex.org/W4282542080","https://openalex.org/W4320478830","https://openalex.org/W4387614720","https://openalex.org/W4389188099","https://openalex.org/W6602954136","https://openalex.org/W6604521588","https://openalex.org/W6631155369","https://openalex.org/W6683877435","https://openalex.org/W6745706219","https://openalex.org/W6748246993","https://openalex.org/W6766002622","https://openalex.org/W6775841903","https://openalex.org/W6788703633"],"related_works":["https://openalex.org/W2582981600","https://openalex.org/W4389238932","https://openalex.org/W4387467152","https://openalex.org/W3010413952","https://openalex.org/W4212885212","https://openalex.org/W4379115910","https://openalex.org/W4253989935","https://openalex.org/W2810560948","https://openalex.org/W2070793896","https://openalex.org/W3084814329"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"the":[3,68,88,104,119,121,149,154,158,170,201,205,208,238,248,254,257],"Internet":[4],"of":[5,16,38,90,151,162,200,227,261,278],"Things":[6],"(IoT)":[7],"paradigm":[8],"has":[9],"been":[10],"widely":[11],"applied":[12],"across":[13],"a":[14,35,113,198,225,276],"variety":[15],"industrial":[17],"and":[18,25,53,77,82,92,134,145,160,177,189,212,217,229,236,259,265,280,289],"consumer":[19],"areas":[20],"to":[21,34,60,79,185,215,287],"facilitate":[22,288],"greater":[23],"automation":[24],"increase":[26],"productivity.":[27],"Higher":[28],"dependability":[29],"on":[30],"connected":[31],"devices":[32],"led":[33],"growing":[36],"range":[37],"cyber":[39],"security":[40,57],"threats":[41],"targeting":[42],"IoT-enabled":[43],"platforms,":[44],"specifically":[45],"device":[46,70],"firmware":[47,63,71,109,167,175,286],"vulnerabilities,":[48],"often":[49],"overlooked":[50],"during":[51],"development":[52],"deployment.":[54],"A":[55],"comprehensive":[56],"strategy":[58],"aiming":[59],"mitigate":[61],"IoT":[62,69,108,122,174,270,285,292],"vulnerabilities":[64,206,228],"would":[65],"entail":[66],"auditing":[67,163,203,239],"environment,":[72],"from":[73,112],"software":[74,135],"components,":[75],"storage,":[76],"configuration,":[78],"delivery,":[80],"maintenance,":[81],"updating,":[83],"as":[84,86],"well":[85],"understanding":[87],"efficacy":[89],"tools":[91,240],"techniques":[93,164],"available":[94],"for":[95,165],"this":[96,99,101],"purpose.":[97],"To":[98,116],"effect,":[100],"paper":[102,155,255,273],"reviews":[103],"state-of-the-art":[105,173],"technology":[106],"in":[107,244,251,268,284],"vulnerability":[110],"assessment":[111],"holistic":[114],"perspective.":[115],"help":[117,243],"with":[118,232,237,275],"process,":[120],"ecosystem":[123],"is":[124,194],"divided":[125],"into":[126],"eight":[127],"categories:":[128],"system":[129],"properties,":[130],"access":[131],"controls,":[132],"hardware":[133],"re-use,":[136],"network":[137],"interfacing,":[138],"image":[139],"management,":[140],"user":[141],"awareness,":[142],"regulatory":[143],"compliance,":[144],"adversarial":[146],"vectors.":[147],"Following":[148],"review":[150,199,222],"individual":[152],"areas,":[153],"further":[156],"investigates":[157],"efficiency":[159],"scalability":[161],"detecting":[166],"vulnerabilities.":[168],"Beyond":[169],"technical":[171],"aspects,":[172],"architectures":[176],"respective":[178],"evaluation":[179],"platforms":[180],"are":[181],"also":[182,196,223],"reviewed":[183],"according":[184],"their":[186,213,233],"technical,":[187],"regulatory,":[188],"standardization":[190],"challenges.":[191],"The":[192,221,272],"discussion":[193],"accompanied":[195],"by":[197],"existing":[202],"tools,":[204],"addressed,":[207],"analysis":[209,252],"method":[210],"used,":[211],"abilities":[214],"scale":[216],"detect":[218],"unknown":[219],"attacks.":[220],"proposes":[224],"taxonomy":[226],"maps":[230],"them":[231],"exploitation":[234],"vectors":[235],"that":[241],"could":[242],"identifying":[245],"them.":[246],"Given":[247],"current":[249],"interest":[250],"automation,":[253],"explores":[256],"feasibility":[258],"impact":[260],"evolving":[262],"machine":[263],"learning":[264],"blockchain":[266],"applications":[267],"securing":[269],"firmware.":[271],"concludes":[274],"summary":[277],"ongoing":[279],"future":[281],"research":[282],"challenges":[283],"support":[290],"secure":[291],"development.":[293]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":37},{"year":2024,"cited_by_count":16}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
