no code implementations • 6 Jan 2021 • Syed Ghazanfar Abbas, Shahzaib Zahid, Faisal Hussain, Ghalib A. Shah, Muhammad Husnain
In this paper, we propose a threat modelling approach to analyze and mitigate the botnet attacks in an IoT smart home use case.
Cryptography and Security Computers and Society
no code implementations • 1 Dec 2020 • Faisal Hussain, Syed Ghazanfar Abbas, Ubaid U. Fayyaz, Ghalib A. Shah, Abdullah Toqeer, Ahmad Ali
The security pitfalls of IoT devices make it easy for the attackers to exploit the IoT devices and make them a part of a botnet.