On the Effectiveness of Clone Detection for Detecting IoT-related Vulnerable Clones

10/20/2021
by   Kentaro Ohno, et al.
0

Since IoT systems provide services over the Internet, they must continue to operate safely even if malicious users attack them. Since the computational resources of edge devices connected to the IoT are limited, lightweight platforms and network protocols are often used. Lightweight platforms and network protocols are less resistant to attacks, increasing the risk that developers will embed vulnerabilities. The code clone research community has been developing approaches to fix buggy (e.g., vulnerable) clones simultaneously. However, there has been little research on IoT-related vulnerable clones. It is unclear whether existing code clone detection techniques can perform simultaneous fixes of the vulnerable clones. In this study, we first created two datasets of IoT-related vulnerable code. We then conducted a preliminary investigation to show whether existing code clone detection tools (e.g., NiCaD, CCFinderSW) are capable of detecting IoT-related vulnerable clones by applying them to the created datasets. The preliminary result shows that the existing tools can detect them partially.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/25/2023

A Large-Scale Study of IoT Security Weaknesses and Vulnerabilities in the Wild

Internet of Things (IoT) is defined as the connection between places and...
research
10/02/2020

A State-of-the-Art Review on IoT botnet Attack Detection

The Internet as we know it Today, comprises several fundamental interrel...
research
09/03/2020

Low-code Engineering for Internet of things: A state of research

Developing Internet of Things (IoT) systems has to cope with several cha...
research
03/02/2023

D-Score: An Expert-Based Method for Assessing the Detectability of IoT-Related Cyber-Attacks

IoT devices are known to be vulnerable to various cyber-attacks, such as...
research
09/03/2023

The End of the Canonical IoT Botnet: A Measurement Study of Mirai's Descendants

Since the burgeoning days of IoT, Mirai has been established as the cano...
research
11/08/2019

A Novel Sybil Attack Detection Scheme Based on Edge Computing for Mobile IoT Environment

Internet of things (IoT) connects all items to the Internet through info...
research
10/21/2022

Approaches to Identify Vulnerabilities to Misinformation: A Research Agenda

Given the prevalence of online misinformation and our scarce cognitive c...

Please sign up or login with your details

Forgot password? Click here to reset