Pub Date : 2022-03-01DOI: 10.1109/ICICT55905.2022.00008
João Dias, Diana Carvalho, Arsénio Reis, J. Barroso, Tânia Rocha
The main purpose for conducting this research is to analyze the core advantages and disadvantages of automatic assessment tools. With this in mind, we considered two different web sites of two distinct Portuguese Universities and compare the accessibility and usability issues found, aiming at identifying core problems through errors / warnings. This outcome will help us understand the weaknesses of such automatic tools and, thus, suggest features that could be added to improve their analysis. These findings will serve as a basis for a proposal of a new type of platform capable of making any web or mobile application accessible to all types of users, regardless of their impairments (e.g., blindness, deafness, motor or intellectual disabilities).
{"title":"Identifying Concerns On Automatic Tools For Accessibility Assessment: A Comparative Case Study On Two Portuguese Universities' Websites","authors":"João Dias, Diana Carvalho, Arsénio Reis, J. Barroso, Tânia Rocha","doi":"10.1109/ICICT55905.2022.00008","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00008","url":null,"abstract":"The main purpose for conducting this research is to analyze the core advantages and disadvantages of automatic assessment tools. With this in mind, we considered two different web sites of two distinct Portuguese Universities and compare the accessibility and usability issues found, aiming at identifying core problems through errors / warnings. This outcome will help us understand the weaknesses of such automatic tools and, thus, suggest features that could be added to improve their analysis. These findings will serve as a basis for a proposal of a new type of platform capable of making any web or mobile application accessible to all types of users, regardless of their impairments (e.g., blindness, deafness, motor or intellectual disabilities).","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121519091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.1109/ICICT55905.2022.00024
Bryan Juville C. Ecarma, Justine Paul S. Luyon, Ma. Michelle A. Pantoja, Kent Dominic A. Quiros, Joacquin Carlo R. Sobrepeña, E. Blancaflor
A rooted android device is a means of unlocking the operating system, which allows any user to install unapproved programs, remove unwanted bloatware, upgrade the operating system, replace the firmware, overclock the processor, modify anything, and more. In this study, the researchers used Android 7 Nougat as an operating system seeking the security of a rooted android device. To test out the overall security of rootkits and advantages they claim to the phone itself, the group conducted penetration of a rooted android phone using the infected application, msfvenom, meterpreter, and metasploit, which resulted in successfully compromising or attacking the android phone. Despite the device being rooted, the Android 7.0 Nougat could not recognize the malicious files and did not protect the device. Though the rooting process was expected to boost the device's security due to superusers and administrative permissions, it could not prevent malicious files into the device.
{"title":"Vulnerability Assessment and Attack Simulation on a Rooted Android Device","authors":"Bryan Juville C. Ecarma, Justine Paul S. Luyon, Ma. Michelle A. Pantoja, Kent Dominic A. Quiros, Joacquin Carlo R. Sobrepeña, E. Blancaflor","doi":"10.1109/ICICT55905.2022.00024","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00024","url":null,"abstract":"A rooted android device is a means of unlocking the operating system, which allows any user to install unapproved programs, remove unwanted bloatware, upgrade the operating system, replace the firmware, overclock the processor, modify anything, and more. In this study, the researchers used Android 7 Nougat as an operating system seeking the security of a rooted android device. To test out the overall security of rootkits and advantages they claim to the phone itself, the group conducted penetration of a rooted android phone using the infected application, msfvenom, meterpreter, and metasploit, which resulted in successfully compromising or attacking the android phone. Despite the device being rooted, the Android 7.0 Nougat could not recognize the malicious files and did not protect the device. Though the rooting process was expected to boost the device's security due to superusers and administrative permissions, it could not prevent malicious files into the device.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134139680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Grinding and polishing of product parts are difficult points for industrial robots to be used in actual manufacturing. In constant force grinding process, the quality of the grinding process depends largely on whether the normal contact force can be kept constant during the grinding process. For this reason, an adaptive control method combined with fuzzy logic for the robot grinding and polishing device is proposed in this paper. In this method, an improvement of the single neuron proportional integral derivative (PID) control method is adopted and applied to the grinding and polishing device of industrial robots. Through simulation, it is found that this method can effectively reduce the adjustment time in contact force control. Aiming at the situation that the device is interfered many times, a non-linear function of the variable learning rate benchmark is proposed to improve the robustness of the system.
{"title":"An Adaptive Control Method for Robot Constant Force Polishing Device","authors":"Jian Yin, Jiachen Ma, Wei Xie, Yifeng Sun, Maoyi Liu, Yonglei Li","doi":"10.1109/ICICT55905.2022.00035","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00035","url":null,"abstract":"Grinding and polishing of product parts are difficult points for industrial robots to be used in actual manufacturing. In constant force grinding process, the quality of the grinding process depends largely on whether the normal contact force can be kept constant during the grinding process. For this reason, an adaptive control method combined with fuzzy logic for the robot grinding and polishing device is proposed in this paper. In this method, an improvement of the single neuron proportional integral derivative (PID) control method is adopted and applied to the grinding and polishing device of industrial robots. Through simulation, it is found that this method can effectively reduce the adjustment time in contact force control. Aiming at the situation that the device is interfered many times, a non-linear function of the variable learning rate benchmark is proposed to improve the robustness of the system.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133516183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.1109/ICICT55905.2022.00034
Filippo Sanfilippo, Jesper Smith, S. Bertrand, Tor Halvard Skarberg Svendsen
Paraplegia is a disability caused by impairment in motor or sensory functions of the lower limbs. Most paraplegic subjects use mechanical or motorised wheelchairs for their movement, however, this may limit the capability of patients to independently perform common activities of daily living (ADL). In this paper, a novel mixed reality (MR) enabled proprio and teleoperation framework for a humanoid robot is presented. The framework can be operated by a paraplegic person by using inputs from an MR headset. The framework enables varied and unscripted manipulation tasks in a realistic environment, combining navigation, perception, manipulation, and grasping. The impaired operator can make use of a wide range of interaction methods and tools, from direct teleoperation of the robot's full-body kinematics to performing grasping tasks or controlling the robot's mobile base. The adopted humanoid robot is the EVEr3 Humanoid Research Robot from Halodi Robotics, while the Oculus Rift S is chosen as MR headset. To demonstrate the potential of the proposed framework, a human subject study is presented. In this study, a home/workplace environment is rendered with MR by combining physical shelves and everyday objects, such as goods to be grasped, with simulated elements, such as the robot avatar and the control interface. A paraplegic subject is involved in the study. Results suggest that the proposed MR-enabled system improves the patient engagement and illusion of presence.
{"title":"Mixed reality (MR) Enabled Proprio and Teleoperation of a Humanoid Robot for Paraplegic Patients","authors":"Filippo Sanfilippo, Jesper Smith, S. Bertrand, Tor Halvard Skarberg Svendsen","doi":"10.1109/ICICT55905.2022.00034","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00034","url":null,"abstract":"Paraplegia is a disability caused by impairment in motor or sensory functions of the lower limbs. Most paraplegic subjects use mechanical or motorised wheelchairs for their movement, however, this may limit the capability of patients to independently perform common activities of daily living (ADL). In this paper, a novel mixed reality (MR) enabled proprio and teleoperation framework for a humanoid robot is presented. The framework can be operated by a paraplegic person by using inputs from an MR headset. The framework enables varied and unscripted manipulation tasks in a realistic environment, combining navigation, perception, manipulation, and grasping. The impaired operator can make use of a wide range of interaction methods and tools, from direct teleoperation of the robot's full-body kinematics to performing grasping tasks or controlling the robot's mobile base. The adopted humanoid robot is the EVEr3 Humanoid Research Robot from Halodi Robotics, while the Oculus Rift S is chosen as MR headset. To demonstrate the potential of the proposed framework, a human subject study is presented. In this study, a home/workplace environment is rendered with MR by combining physical shelves and everyday objects, such as goods to be grasped, with simulated elements, such as the robot avatar and the control interface. A paraplegic subject is involved in the study. Results suggest that the proposed MR-enabled system improves the patient engagement and illusion of presence.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124247049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.1109/ICICT55905.2022.00047
Alexis Ramírez-Mosquera, Christian Ruales-Galarza, Freddy Acosta Buenaño, D. Rivas-Lalaleo
The development of agriculture is based on the improvement of living standards, at the national level in the provinces of Cotopaxi and Tungurahua represents a topic of special interest, currently the agricultural sector is impacted by climate change, temperature and humidity variation, and soil alteration. This is why the Internet of Things with the integration of wireless communication technologies and sensors offer the possibility of generating technological systems that collect data from crop fields. The present study was based on the comparative analysis of wireless communication technologies for IoT in the monitoring of agricultural areas, compiling studies of scientific databases identifying global, American continent and local trends. The communication technologies were evaluated with their characteristics based on the Hierarchical Analysis Process method, obtaining Sigfox, LoRa and Zigbee as the main alternatives for radio coverage simulations. Subsequently, the radiation pattern of the technologies was obtained, selecting Sigfox for its characteristics and performance as the technology to be implemented for the network and sensor node operation. It was concluded that Sigfox is suitable for monitoring agricultural crops due to its wide coverage range, economic cost and low data sending rate, being a communication alternative for early warning of frost detection.
{"title":"Comparative Analysis of IoT Communication Technologies for Monitoring Agricultural Areas in the Provinces of Cotopaxi and Tungurahua - Ecuador","authors":"Alexis Ramírez-Mosquera, Christian Ruales-Galarza, Freddy Acosta Buenaño, D. Rivas-Lalaleo","doi":"10.1109/ICICT55905.2022.00047","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00047","url":null,"abstract":"The development of agriculture is based on the improvement of living standards, at the national level in the provinces of Cotopaxi and Tungurahua represents a topic of special interest, currently the agricultural sector is impacted by climate change, temperature and humidity variation, and soil alteration. This is why the Internet of Things with the integration of wireless communication technologies and sensors offer the possibility of generating technological systems that collect data from crop fields. The present study was based on the comparative analysis of wireless communication technologies for IoT in the monitoring of agricultural areas, compiling studies of scientific databases identifying global, American continent and local trends. The communication technologies were evaluated with their characteristics based on the Hierarchical Analysis Process method, obtaining Sigfox, LoRa and Zigbee as the main alternatives for radio coverage simulations. Subsequently, the radiation pattern of the technologies was obtained, selecting Sigfox for its characteristics and performance as the technology to be implemented for the network and sensor node operation. It was concluded that Sigfox is suitable for monitoring agricultural crops due to its wide coverage range, economic cost and low data sending rate, being a communication alternative for early warning of frost detection.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124622479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.1109/icict55905.2022.00006
{"title":"Committees: ICICT 2022","authors":"","doi":"10.1109/icict55905.2022.00006","DOIUrl":"https://doi.org/10.1109/icict55905.2022.00006","url":null,"abstract":"","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"386 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124788252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.1109/ICICT55905.2022.00025
Zhixuan He
In recent years, machine learning has become a popular area in the IT field. In 2016, a game AI AlphaGo turned out to defeat many Go masters. The technology behind AlphaGo: the popularity of deep reinforcement learning is gradually increasing. This paper aims to use deep reinforcement learning algorithm to train a specific model which can play the Flappy Bird game autonomously. In this paper, two types of optimizers: Adam and RMSProp are used in the deep neural network during the training sessions and the testing results with the models are compared to figure out which model has a better performance when playing Flappy Bird. From the testing results, when the training rounds is insufficient, the model with Adam optimizer performs better than the model with RMSProp optimizer. However, when the training rounds are large enough, the performance of the model with RMSProp optimizer is almost 2 times better than the model with Adam optimizer. After comparison between the two models, this paper finds out that with the increasing of the training rounds, the performance of model with RMSProp optimizer will gradually exceed the model with Adam optimizer.
{"title":"Analysis on Deep Reinforcement Learning with Flappy Brid Gameplay","authors":"Zhixuan He","doi":"10.1109/ICICT55905.2022.00025","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00025","url":null,"abstract":"In recent years, machine learning has become a popular area in the IT field. In 2016, a game AI AlphaGo turned out to defeat many Go masters. The technology behind AlphaGo: the popularity of deep reinforcement learning is gradually increasing. This paper aims to use deep reinforcement learning algorithm to train a specific model which can play the Flappy Bird game autonomously. In this paper, two types of optimizers: Adam and RMSProp are used in the deep neural network during the training sessions and the testing results with the models are compared to figure out which model has a better performance when playing Flappy Bird. From the testing results, when the training rounds is insufficient, the model with Adam optimizer performs better than the model with RMSProp optimizer. However, when the training rounds are large enough, the performance of the model with RMSProp optimizer is almost 2 times better than the model with Adam optimizer. After comparison between the two models, this paper finds out that with the increasing of the training rounds, the performance of model with RMSProp optimizer will gradually exceed the model with Adam optimizer.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129876717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.1109/ICICT55905.2022.00012
Smita Ghosh, Pramita Das, Sneha Ghosh, Diptaraj Sen
Users on Online Social Networks play a pivotal role in the spread of misinformation and malicious content across these platforms. Clickbait headlines are one such malicious content that causes nuisance online. Resonating the idea of ‘Precaution is Better than Cure’, this paper focused on developing methods for the early detection of malicious clickbait content spreaders on Online Social Networks by finding User's Sharing Potential for each such malicious content user. In a billion node network, as the speed of content propagation is high, by the time they are detected to be fake or harmful, it's too late to take any recovery measures. The User's Sharing Potential of a user will help identify the potential sources/spreaders of clickbait content based on their past tendencies of sharing or publishing such information on an Online Social Network. The User's Sharing Potential metric also incorporated the effect of the influence of a user's neighborhood in the network, thus combining both user and neighborhood characteristics in determining the sharing pattern of a user. Different machine learning and deep learning models were trained for detecting clickbait posts of a user with almost ninety percent accuracy for some models. The trained classifiers and graph features were used to find the sharing potential of each user. Experiments were performed on real world datasets and the results show the efficacy of the proposed approach.
{"title":"Detection of Clickbait Content Spreaders on Online Social Networks","authors":"Smita Ghosh, Pramita Das, Sneha Ghosh, Diptaraj Sen","doi":"10.1109/ICICT55905.2022.00012","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00012","url":null,"abstract":"Users on Online Social Networks play a pivotal role in the spread of misinformation and malicious content across these platforms. Clickbait headlines are one such malicious content that causes nuisance online. Resonating the idea of ‘Precaution is Better than Cure’, this paper focused on developing methods for the early detection of malicious clickbait content spreaders on Online Social Networks by finding User's Sharing Potential for each such malicious content user. In a billion node network, as the speed of content propagation is high, by the time they are detected to be fake or harmful, it's too late to take any recovery measures. The User's Sharing Potential of a user will help identify the potential sources/spreaders of clickbait content based on their past tendencies of sharing or publishing such information on an Online Social Network. The User's Sharing Potential metric also incorporated the effect of the influence of a user's neighborhood in the network, thus combining both user and neighborhood characteristics in determining the sharing pattern of a user. Different machine learning and deep learning models were trained for detecting clickbait posts of a user with almost ninety percent accuracy for some models. The trained classifiers and graph features were used to find the sharing potential of each user. Experiments were performed on real world datasets and the results show the efficacy of the proposed approach.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129035089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.1109/ICICT55905.2022.00044
Sharmin Nahar Sharwardy, M. Rahman, H. Sarwar
Intensive care medicine usually involves making quick decisions based on large amounts of information. In making medical decisions, ICU physicians generally rely on personal experience to make subjective evaluations. It is necessary to continuously monitor the parameters related to the admission and health of ICU patients, and it seems necessary to equip each intensive care unit with a special estimation system. This paper develops a Markov chain model to predict patient conditions in the ICU. The dataset we used for this model is pediatric congenital heart disease ICU patients. The state is determined by prior age, weight, CVP, blood pressure, and urine output. We propose a state-based transition probability matrix using these parameters. Experimental results show that deteriorated patients rarely go to an improvement state. This analysis will be helpful in significantly improving the quality of care in the ICU.
{"title":"ICU Patient Status Prediction Using Markov Chain Model","authors":"Sharmin Nahar Sharwardy, M. Rahman, H. Sarwar","doi":"10.1109/ICICT55905.2022.00044","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00044","url":null,"abstract":"Intensive care medicine usually involves making quick decisions based on large amounts of information. In making medical decisions, ICU physicians generally rely on personal experience to make subjective evaluations. It is necessary to continuously monitor the parameters related to the admission and health of ICU patients, and it seems necessary to equip each intensive care unit with a special estimation system. This paper develops a Markov chain model to predict patient conditions in the ICU. The dataset we used for this model is pediatric congenital heart disease ICU patients. The state is determined by prior age, weight, CVP, blood pressure, and urine output. We propose a state-based transition probability matrix using these parameters. Experimental results show that deteriorated patients rarely go to an improvement state. This analysis will be helpful in significantly improving the quality of care in the ICU.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115182844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.1109/ICICT55905.2022.00009
Shady Shahin, Hassan Soubra
Today, with the omnipresence of the Internet of Things (IoT) devices around the world, Cybersecurity threats have become a major concern. Security professionals who act as adversaries, or Red teams, play an important role in testing the security of those IoT devices. Adversary Emulation systems are one means towards identifying Cybersecurity vulnerabilities. In this paper, we review IoT malware in the literature and we propose an IoT Adversary Emulation prototype tool that covers different IoT malware techniques such as exploitation, evasion, data exfiltration and persistence. The prototype tool proposed has been tested using an IoT system composed of a router with IP cameras.
{"title":"An IoT Adversary Emulation prototype tool","authors":"Shady Shahin, Hassan Soubra","doi":"10.1109/ICICT55905.2022.00009","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00009","url":null,"abstract":"Today, with the omnipresence of the Internet of Things (IoT) devices around the world, Cybersecurity threats have become a major concern. Security professionals who act as adversaries, or Red teams, play an important role in testing the security of those IoT devices. Adversary Emulation systems are one means towards identifying Cybersecurity vulnerabilities. In this paper, we review IoT malware in the literature and we propose an IoT Adversary Emulation prototype tool that covers different IoT malware techniques such as exploitation, evasion, data exfiltration and persistence. The prototype tool proposed has been tested using an IoT system composed of a router with IP cameras.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122127394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}