ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
14
views
18
references
Top references
cited by
3
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,719
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Smart Card Research and Advanced Applications
Opening Pandora’s Box: Effective Techniques for Reverse Engineering IoT Devices
other
Author(s):
Omer Shwartz
,
Yael Mathov
,
Michael Bohadana
,
Yuval Elovici
,
Yossi Oren
Publication date
(Online):
January 26 2018
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Journal of Paleontological Techniques
Most cited references
18
Record
: found
Abstract
: not found
Article
: not found
Security, privacy and trust in Internet of Things: The road ahead
S. Sicari
,
Diego A Rizzardi
,
L.A. Grieco
…
(2015)
0
comments
Cited
236
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Lest we remember
Seth D. Schoen
,
J. Halderman
,
Edward Felten
…
(2009)
0
comments
Cited
60
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
IoT Security: Ongoing Challenges and Research Opportunities
Zhi-Kai Zhang
,
Michael Cho
,
Chia-Wei Wang
…
(2014)
0
comments
Cited
59
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2018
Publication date (Online):
January 26 2018
Pages
: 1-21
DOI:
10.1007/978-3-319-75208-2_1
SO-VID:
c3039b15-2f19-47b4-8d9e-bcada022ae5d
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Opening Pandora’s Box: Effective Techniques for Reverse Engineering IoT Devices
Similar content
2,719
Opening pandora’s box: Effective techniques for reverse engineering IoT Devices
Authors:
Defining Radiotherapy Target Volumes Using 18F-Fluoro-Deoxy-Glucose Positron Emission Tomography/Computed Tomography: Still a Pandora’s Box?: In Regard to Devic et al. (Int J Radiat Oncol Biol Phys 2010)
Authors:
Mathieu Hatt
,
Dimitris Visvikis
Including Non-humans in Political Theory: Opening Pandora’s Box?
Authors:
Stengers
See all similar
Cited by
3
BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices
Authors:
Paria Shirani
,
Leo Collard
,
Basile Agba
…
Genetic Information Insecurity as State of the Art
Authors:
Garrett Schumacher
,
Sterling Sawaya
,
Demetrius Nelson
…
Finding Software Bugs in Embedded Devices
Authors:
Aurelien Francillon
,
Sam Thomas
,
Andrei Costin
See all cited by