A Survey of Cross-Layer Security for Resource-Constrained IoT Devices
Abstract
1. Introduction
1.1. Motivation and Scope
1.2. Contributions and Article Organization
- Cross-layer taxonomy: We propose a systematic taxonomy that organizes IoT security mechanisms by system level, algorithmic paradigm, data granularity, and hardware budget. This classification not only clarifies the design trade-offs of existing solutions but also offers a practical framework for positioning emerging research.
- Focused benchmarking: We integrate state-of-the-art firmware security techniques (e.g., static analysis, symbolic execution, machine learning–based binary similarity) with representative network intrusion detection models. Their performance is empirically evaluated on real IoT hardware with respect to accuracy, latency, and deployability.
- Research agenda and exploration goals: Instead of posing open-ended questions, we outline concrete directions for exploration:
- Exploring compatibility challenges of binary analysis across diverse instruction set architectures (ISAs).
- Investigating strategies to minimize the footprint of intrusion detectors while maintaining high accuracy in anomaly detection.
- Advancing hybrid symbolic–learning procedures that combine the rigor of symbolic execution with the adaptability of machine learning.
- Extending cross-layer approaches to incorporate behavioral anomaly detection and zero-latency verification aligned with ZTA principles.
2. Background and Threat Landscape
2.1. Typical IoT Architecture and Resource Constraints
2.2. Multi-Layer Attack Surface
- Firmware level. The ZigBee Light-Link worm showed that a single unpatched binary could set off a chain reaction that affected all lights in an installation [11].
- Network level. More than 70% of tested BLE devices still default to “Just Works” pairing within local radio range. This makes it easier for attackers to forge connections and launch man-in-the-middle attacks [12]. In the backbone, common messaging protocols such as MQTT or AMQP make it easier for attackers to steal session tokens and send forged commands through the cloud [13].
- Trust level. Zero Trust Architecture (ZTA) eliminates mutual trust between users, devices, and workloads, but most current pilots only consider user access to the cloud without checking the provenance of firmware or real-time sensor data [15].
2.3. Security Requirements for Edge-Bound Deployments
- Lightweight, with both integrity and privacy. IoT devices typically do not have enough RAM or code space to use standard protocols such as TLS or DTLS. Therefore, security suites must use cryptographic algorithms with smaller memory footprints and simpler handshakes, while still being able to protect against active attackers on the wireless channel [7].
- Multi-layered, fine-grained access control. Security measures should be implemented not only at the cloud API level, but also in the firmware call graph, wireless MAC layer, and lightweight message brokers. If permissions are not enforced at each layer, there is a risk of lateral movement and escalation of the trust chain [8].
- Continuously audit and grant as few access permissions as possible. Modern designs must rethink the identification, localization, and context of each abnormal state change based on zero trust principles [15,16]. However, these checks are currently performed only at the cloud edge, not in embedded runtime environments.
- Local actionability and explainability are critical. Engineers need to understand the meaning of alerts without being able to view cloud logs or developer consoles. Compact on-device summaries (ideally using reduced or quantized language models) are still an emerging research topic [9], but can provide explainable diagnostic results without sacrificing latency or power consumption.
3. Survey Methodology
3.1. Search Strategy and Databases Queried
- IEEE Xplore and ACM Digital Library—core venues for networked-system security and embedded software;
- ScienceDirect and SpringerLink—major publishers of IoT-specific journals;
- Web of Science and Scopus—multidisciplinary indexing and citation tracing;
- Google Scholar—discovery of gray literature and early-view conference papers;
- arXiv (cs.CR, cs.NI, eess.SP)—access to pre-publication manuscripts.
3.2. Inclusion and Exclusion Criteria
3.3. Review Workflow
- Article identification. A comprehensive keyword-based search of major academic databases and preprint servers retrieved a total of 1084 articles. After automatically removing 142 duplicates by matching DOI, title, and arXiv ID, 942 unique articles remained for further review.
- Screening. Titles and abstracts were evaluated according to the inclusion and exclusion criteria defined in Section 3.2. In this step, a total of 579 articles were excluded, including editorials, position papers, short abstracts, purely cloud-centric studies, and articles not related to IoT or resource-constrained environments. A total of 363 articles were reviewed in full text.
- Eligibility review. Afterwards, we reviewed the full text to ensure methodological soundness and direct relevance to firmware, lightweight network defense, behavioral modeling, zero trust implementation, or device-side explainability. Papers that did not conduct empirical evaluation, papers that were superseded by new versions, or papers that only focused on traditional IT systems were excluded.
4. Taxonomy of Cross-Layer IoT Security
4.1. Security-Layer Perspective
- Firmware/Device Layer. This layer includes security features that directly affect hardware peripherals, microcontroller instructions, or device firmware. This layer provides both active analysis (e.g., vulnerability detection) and runtime protection mechanisms (e.g., attestation and execution control). Many embedded systems lack memory protection or statically link binaries, making them vulnerable to attacks such as memory corruption, control flow hijacking, and binary reuse. Recent research has focused on finding parallels between symbolic execution [18], lightweight taint tracking [19], and semantic hashing [20] and firmware. Researchers have also explored shadow stack enforcement [21], TrustZone isolation [22], and secure boot [23] to ensure runtime security. These approaches are particularly important in mission-critical applications such as drones, industrial actuators, and medical sensors, where firmware compromise can have severe practical consequences.
- Network/Transport Layer. The network layer encompasses communications based on Bluetooth Low Energy (BLE), ZigBee, LoRa, Wi-Fi, and MQTT-based cloud protocols. Security at this layer includes device fingerprinting, traffic injection, spoofing, replay, and protocol degradation. Existing defenses include Bluetooth Low Energy fingerprinting [24], packet timing and channel hopping anomaly detection [25], and lightweight intrusion detection systems (IDS) using compressed CNNs or GNNs [26,27]. Additionally, there are numerous examples of attacks targeting specific protocols, such as ZigBee Touch Link Hijacking [28], MQTT Hijacking [29], and Bluetooth Address Randomization Failures [30]. Many embedded IDS engines use bitfield encoding or Bloom filters [31,32] and operate on systems with less than 100 kB of RAM.
- Behavioral/application layer. This layer monitors the consistency of higher-level application logic, actuator control, and sensor data. It provides both direct models of time-varying physical processes (e.g., the water level in a tank) and indirect models, such as policies for monitoring context-aware applications. Graph-based models, such as GAT-GRU [33], temporal sensor anomaly detectors [34], and hybrid context/state machine verifiers [35,36], are widely used in industry. To prevent privilege abuse, smart homes utilize tools such as ContexIoT [37] and Soteria [38] to record user interactions with devices. Modeling the overall behavior of a device is crucial for detecting hidden behaviors or policy violations that cannot be detected by firmware or packet filters.
- Trust/Policy Layer. This layer adds logical structure and architectural guidance to ensure reliable system operation across different domains. It includes zero-trust identity enforcement, continuous authentication, remote attestation chains, and federated policy control. Systems such as WAVE [39], XToken [40], and MPA [41] aim to achieve fine-grained authorization and feature propagation in resource-constrained multi-tenant systems. Trust layer approaches also include device access protocols [42] for protection against forged configuration attacks (e.g., ghost device attacks) and distributed ledger systems for trust traceability [43]. These approaches are particularly important when IoT devices are owned by multiple parties and policies need to be coordinated without a shared physical infrastructure.
4.2. Data Granularity
4.3. Implementation Models and Algorithmic Paradigms
4.3.1. Deployment Models
4.3.2. Algorithm Paradigms in Cyberspace Security Applications
- Machine Learning Paradigms
- Deep Learning Paradigms
- Optimization Algorithm Paradigms
5. Firmware-Level Security
5.1. Static and Symbolic Analysis Techniques
5.1.1. Static Analysis Techniques
- Costin et al. [99] developed a method for analyzing large numbers of firmware files using fuzzy hashing. The method finds backdoor vulnerabilities such as weak keys and hardcoded credentials by finding similarities between firmware files. By examining 693 firmware images, 38 known vulnerable files were identified. However, the file-level granularity makes the method less precise, and the additional effort makes it unsuitable for large-scale firmware.
- Stringer [100] developed a method for comparing static data in commercial off-the-shelf (COTS) firmware to detect hardcoded credentials and undocumented functions. The method finds potential backdoors by comparing static strings in binary files. The method is well suited for large-scale analysis, but has a high false positive rate.
- HumIDIFy [101] proposed a semi-supervised learning method for finding binary functions in firmware and comparing them to predicted functions to detect hidden functions or backdoors. Tests show that the analysis of COTS firmware has a low false positive rate, although the method requires a high-quality training dataset.
- Firmlice [102]: Uses static analysis to build a program dependency graph (PDG), uses authentication slices from entry points to privileged operations, and combines symbolic execution to check fixed-value routing restrictions to find backdoors that bypass authentication. The method is very accurate, but only works for certain types of backdoors and is difficult to apply to other types of vulnerabilities.
- DTaint [103]: A method for vulnerability detection using taint analysis is proposed, which traces data from sensitive inputs (sources) to dangerous functions (sinks) by building data flow graphs of intra-procedural and inter-procedural data flows, and finds buffer overflows and instruction injections. DTaint’s bottom-up analysis can detect vulnerabilities more accurately, but takes longer for complex firmware.
- SainT [104]: In IoT applications, it monitors sensitive data (such as device status or user information) sent to external outputs and finds possible data leaks. SainT works well for type I firmware, but does not work well for type II and type III firmware because these formats are too complex.
- Zheng et al. [105]: They combined protocol parsing with static taint analysis to find protocol fields and key functions in firmware, thereby accelerating the search for taint-based vulnerabilities. This strategy reduces the amount of analysis by selecting appropriate keywords, thereby improving efficiency.
- Karonte [106] proposed a multi-binary static analysis method to simulate the communication between firmware components (such as web servers and background services) to discover insecure data transmission or logic vulnerabilities. Karonte solves some of the problems of single-component analysis, but needs to better handle more complex firmware.
- PrivacyGuard [107]: A framework has been developed for detecting privacy leaks in applications. It uses static analysis to check trigger condition-action rules in IoT applications to identify privacy risks such as location tracking and activity analysis vulnerabilities. The system is well suited for evaluating large IoT application datasets and significantly improves the level of privacy protection [107].
- Smart Home IoT Firmware Analysis and Exploitation Framework [108]: The framework supports reverse analysis of smart home IoT firmware to identify network weaknesses (such as unencrypted communication and weak authentication) and missing protection mechanisms (such as NX and Stack Canary). This helps in analyzing the security of smart home devices [108].
- Hardware Information Flow Tracing [109]: A simple path-based hardware information flow tracing method is proposed. It uses static analysis to examine firmware-hardware interactions and detect potential information leaks and dangerous operations. The method works well on low-resource devices and is fairly accurate [109].
5.1.2. Symbolic Execution Techniques
- Firmware preprocessing: As with static analysis, the executable code is extracted from the firmware and converted into an intermediate representation, such as LLVM-IR or VEX.
- Input symbolization: The program input (e.g., user input or peripheral input) is converted into symbolic variables.
- Constraint solving: A constraint solver is used to check whether the input can trigger the vulnerability by checking the satisfiability of the path constraints.
- Avatar [113]: A hybrid execution framework that leverages both symbolic execution and full-system simulation is proposed. It uses S2E [114] as a symbolic execution engine, dynamically intercepts simulation events (such as memory access or instruction execution), and selectively symbolizes important code segments to find vulnerabilities. This approach works for class I, II, and III firmware, but not for all peripherals.
- FIE [115]: Based on KLEE, a symbolic execution tool for MSP430 microcontrollers is developed that can simulate memory and interrupt operations to find security vulnerabilities. FIE only works for MSP430 and has many bugs due to path explosion.
- FirmUSB [103]: This is a USB controller firmware for the 8051/52 architecture that leverages domain knowledge and symbolic execution to create functional models and find BadUSB vulnerabilities. FirmUSB limits the scope of symbolic execution, making it seven times more efficient than conventional symbolic execution.
- Inception [116]: Created a symbolic virtual machine based on KLEE to transfer firmware code to LLVM-IR to find memory leaks in ARM Cortex-M3 firmware. Inception can analyze assembly and library functions, but it does not work well for complex firmware.
- Gerbil [117]: Searches for privilege separation vulnerabilities by using backward slicing to find potentially vulnerable code regions and combining symbolic execution to search deep paths. Gerbil avoids path explosion by skipping complex library functions, but requires rich domain knowledge.
- FIoT [118]: Uses static analysis and symbolic execution to build firmware control flow graphs to represent the paths of critical function inputs. Dynamic fuzzing is also used to find memory corruption vulnerabilities [119]. FIoT limits the scope of analysis but has difficulties in managing peripheral information.
- Path explosion: Firmware code with complex control flows and loops can generate exponentially many paths, placing higher demands on computer performance [115].
- Peripheral dependencies: Embedded firmware often works with peripherals such as MMIO or interrupts, which are difficult for symbolic execution engines to model correctly. This can cause the analysis to abort or lead to incorrect conclusions [113].
- Complex environment setup: Symbolic execution requires complex tools such as disassemblers, instrumentation tools, and constraint solvers, which makes it difficult to use on resource-constrained embedded devices [117].
- Limitations of constraint solving: Constraints imposed by cryptographic algorithms or complex hash functions in firmware are sometimes difficult to solve, reducing its practicality [103].
5.1.3. Analysis and Evaluation
5.1.4. Future Improvements
5.2. Machine Learning-Assisted Binary Similarity Analysis
5.2.1. Necessity of ML-Assisted Binary Similarity Analysis
- Why binary similarity is needed at the firmware level.
- Closing the gap between breadth and evidence.
- What makes ML similarity robust in practice.
- Supply chain reuse and fleet-wide recall.
- How this complements traditional dynamic testing.
5.2.2. ML-Assisted Binary Similarity Workflow
- Stage 1—Acquisition and normalization.
- Stage 2—Feature extraction.
- Stage 3—Representation and retrieval.
- Stage 4—Triage, attribution, and verification.
- Design choices that materially improve outcomes.
5.2.3. Technical Challenges (Root Causes, Symptoms, and Single-Source Mitigations)
- C1—Information loss after compilation. Root cause: symbols and high-level structure are erased; inlining collapses call boundaries. Symptom: unstable matches and high analyst burden. Mitigation: rely on relational views such as ACFG/PDG to preserve structural semantics during retrieval, then attach PDG-based slices to produce auditable evidence for security-critical flows [102].
- C2—ISA diversity. Root cause: the same semantics map to different opcode vocabularies and calling conventions. Symptom: high same-ISA accuracy that degrades across architectures. Mitigation: learn ACFG embeddings explicitly trained to be stable across architectures so that semantically equivalent routines cluster together during retrieval [130].
- C3—Compiler/opt-level variance. Root cause: O-level changes, inlining decisions, and link-time optimization reshape CFGs. Symptom: hand-crafted graph features drift; recall collapses under O3 vs. O0. Mitigation: augment structural features with short semantic traces from partial emulation, which smooth compiler noise while preserving the cues needed for disambiguation [142].
- C4—Function inlining. Root cause: small helpers vanish as standalone functions; boundaries blur. Symptom: systematic false negatives for utility routines commonly implicated in bugs. Mitigation: detect and recover inlined regions before modeling so that both token and graph learners operate on function units that better reflect source semantics [141].
- C5—Obfuscation and CFG distortion. Root cause: control-flow flattening and bogus edges decouple CFG shape from behavior. Symptom: CFG-centric descriptors lose discriminative power. Mitigation: emphasize token/sequence embeddings with attention, which learn instruction-level semantics less sensitive to CFG distortion and retain discriminative power under moderate obfuscation [134].
- C6—Multi-block/function vulnerabilities. Root cause: end-to-end flaws span helpers, drivers, or inter-process boundaries. Symptom: function-only retrieval flags fragments without a triggerable path. Mitigation: perform multi-binary flow reasoning during verification so that candidate matches are elevated only when an inter-component data path to a dangerous sink exists [106].
- C7—Patch similarity and false positives. Root cause: patched and vulnerable variants remain structurally close. Symptom: alerts on already-fixed code waste patch windows. Mitigation: include patched/unpatched pairs during training and add a verification gate that checks for the specific guard or bounds fix introduced by the patch before escalating a finding [145].
- C8—Accuracy versus verifiability. Root cause: high cosine similarity does not imply exploitability. Symptom: strong ranking with weak artifacts slows engineering sign-off. Mitigation: attach PDG slices or targeted symbolic inputs to each high-rank match so that every alert is accompanied by concrete paths or inputs that are auditable by developers [102].
- C9—Throughput and indexing at scale. Root cause: naïve all-pairs comparison is quadratic in corpus size. Symptom: time budgets exhausted before useful recall is reached. Mitigation: use approximate nearest-neighbor indexing and batched inference so that retrieval time scales sub-linearly with corpus size; design ranking to maximize early discovery under fixed budget [146].
- C10—Sustained scalability under fleet growth. Root cause: the number of images and variants grows faster than analyst/compute budgets. Symptom: thresholds drift upward, recall declines, and backlogs accumulate. Mitigation: adopt two- or three-stage cascades—lightweight pre-filters, semantic enrichment, then targeted verification—so recall per unit compute remains stable as the fleet expands [147].
5.2.4. ML-Assisted Techniques and Tools
- Statistical Feature-Based Methods
- Dynamic Feature-Based Methods
- Learning-Based Methods
5.2.5. Comparative Analysis
5.2.6. Open Research Challenges
- Firmware reverse engineering: Accurate reverse engineering remains difficult and often requires expert knowledge [172].
- Efficient storage and retrieval: Large firmware corpora require better methods to store and query data that have not been fully studied.
- Vulnerability dataset construction: Most datasets only consider application-level CVEs, but not firmware-specific vulnerabilities [173].
- Cross-function/binary vulnerabilities: Currently, we can only consider vulnerabilities in a single function, while ignoring cross-process vulnerabilities [174].
- False positives/false negatives: Static analysis is difficult due to the large number of false positives and false negatives [175].
- Lack of common benchmarks: Comparative analysis is also difficult due to different datasets and evaluation criteria [15].
5.2.7. Future Directions
- Configuration robustness: Improve machine learning models to handle function inlining, obfuscation, and cross-project changes. Use the ideas in FSmell [141] as a starting point.
- Improve reverse engineering: Develop more advanced disassemblers to handle complex firmware binaries [172].
- Firmware-specific models: Use semi-supervised learning and reinforcement learning to find firmware-specific vulnerabilities [176].
- Generic vulnerability signatures: Create templates for vulnerability classes (e.g., buffer overflows) rather than targeting specific CVEs.
- Unified datasets: Establish standard datasets for training, testing, and CVE querying.
- Hybrid analysis models: Use frameworks such as BinaryAI [138] for scalable software composition analysis that combines static analysis, dynamic verification, and machine learning for complete firmware testing.
6. Integrated Network, Behavioral, and Policy-Layer Security
6.1. Lightweight Intrusion Detection and Signature-Based Models
6.2. Deep/Graph-Based IDS with Behavioral Features
6.3. Sensor-Actuator and RF-Spectrum Anomaly Analytics
6.4. Identity, Micro-Segmentation, and Zero-Trust Enforcement
6.5. Limitations, Cross-Layer Gaps, and Future Work
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A. Practitioner-Facing Artifacts
Layer | Paradigm | Tool/System (Example) | One-Line Purpose | Typical Deployment | Minimal Resource Note |
---|---|---|---|---|---|
Firmware | Unpacking/preprocessing | Binwalk; BANG | Recover file systems/binaries from images for downstream analysis | Edge/Cloud | CPU-bound; tens of minutes for large images; RAM in GB-scale for batch runs |
Firmware | Static (IR/graphs) | IDA Pro, Ghidra | Disassembly/CFG/IR to enable slicing and taint analysis | Edge/Cloud | Memory heavy on large firmware; plugin support for many ISAs |
Firmware | Static + program slicing | Firmalice | PDG-guided authentication-bypass discovery via slicing + checks | Edge/Cloud | Hours per image on commodity CPUs; requires IR build |
Firmware | Static taint analysis | DTaint | Tracks source → sink flows to surface memory/command-injection risks | Edge/Cloud | Sensitive to library modeling; multi-binary speedups advised |
Firmware | Multi-binary reasoning | Karonte | Models inter-process/component flows to catch cross-binary flaws | Edge/Cloud | Requires per-service configuration; higher RAM |
Firmware | Symbolic execution (hybrid) | Avatar, S2E | Hybrid SE with device/system emulation for deep path feasibility | Edge/Cloud | Solver/emu heavy; best under narrowed scopes |
Firmware | Symbolic (platform-specific) | FIE (MSP430), FirmUSB (8051/USB) | Platform-tailored SE for microcontroller/USB firmware | Edge | Good precision; limited to supported MCUs/peripherals |
Firmware | Symbolic (LLVM/KLEE) | Inception, Gerbil | SE with slicing/backward analysis for privilege/logic flaws | Edge/Cloud | Requires stubs for MMIO/crypto; mitigated by selective symb. |
Firmware | Hybrid SE + fuzz | FIoT, HD-FUZZ | Combine selective SE with fuzzing and MMIO modeling | Edge | Better coverage on embedded paths; setup effort moderate |
Firmware | ML similarity (graph) | Genius, Gemini, VulSeeker, VulSeeker-Pro, IoTSeeker | ACFG/GNN embeddings for cross-variant vulnerable-code retrieval | Edge/Cloud | CPU-centric; optional GPU; index fits in GBs; robustness per Table 6 |
Firmware | ML similarity (tokens/attention) | Asm2Vec, SAFE | Instruction/token embeddings (w/attention) robust to CFG noise | Edge/Cloud | Fast inference; sensitive to inlining unless preprocessed |
Firmware | Inline recovery | FSmell | Detects/reconstructs inlined helpers to reduce false negatives | Edge/Cloud | Pre-pass; improves recall for similarity pipelines |
Firmware | SCA/provenance | BinaryAI | Maps binaries to source/patch lineage for SBOM/attribution | Cloud/Edge | Embedding + ANN search; integrates with CI/SBOM |
Network | Lightweight IDS | Hash/XOR-style IDS (e.g., Buck et al.) | Signature/bitfield/Bloom-style fast screening on constrained links | MCU/Edge | kB-scale RAM; sub-10 ms latency (see Table 7) |
Network | SPA/admission | Single Packet Authorization (SPA) | Cryptographic single-packet gate before session setup | MCU/Edge | Minimal CPU; integrates with firewall/PEP |
Network | Protocol-aware auditing | FirmXRay (BLE) | Audit BLE pairing/keys/mode use; flag weak defaults | Edge | Runs off-device; informs on-device filters |
Behavior | Context policy | ContexIoT, Soteria | App-level context/policy checking to prevent privilege abuse | Edge/Cloud | Low runtime cost; upfront policy modeling |
Behavior | Telemetry anomaly (DL) | N-BaIoT (DAEs) | Device-behavior anomaly detection from traffic/telemetry | Edge/Cloud | 50–100 ms typical on edge; model fits in 10 s–100 s MB |
RF/Wireless | Spectrum analytics | [16] RF-IDS (prototype) | RF fingerprint/DoS/spoofing detection from I/Q/spectrum | Edge | SDR required; 150–300 ms latency class (Table 7) |
Trust/Policy | Fine-grained authZ | WAVE, XToken, MPA | Tokenized/chain-of-trust authorization and multi-party approval | Cloud/Edge | PEP/PDP integration; low per-decision latency (<20 ms) |
Trust/Policy | Micro-segmentation | Gateway PEP/PA (industrial) | Segment device classes; enforce least privilege at gateways | Edge/Cloud | Policy design effort; low runtime cost (Table 7) |
Trust/Policy | Blockchain-assisted MFA | Li et al. MFA | MFA + device attributes for heterogeneous fleets | Cloud/Edge | Added crypto overhead; offloads to cloud when possible |
Device Class & Budget | Firmware Layer | Network Layer | Behavior Layer | Trust/Policy | Accuracy/Latency (Ref. Table 6 and Table 7) | Operational Notes |
---|---|---|---|---|---|---|
Tiny MCU (≤256 kB RAM) | Integrity checks; off-device batch screening; selective SE for top cases | Lightweight IDS; SPA gate | Rule-based sanity checks | Gateway/cloud PEP/PDP | IDS ~ 85–90% @<10 ms | Minimal runtime; main cost is safe OTA + CI pipeline |
Mid-range MCU (512 kB–2 MB RAM) | Batch ML screening (SAFE/VulSeeker-Pro); micro-exec for top-K | Lightweight IDS + protocol filters | Edge-assisted telemetry | Micro-segmentation by role | IDS < 20 ms; precision per Table 6 | Higher integration burden; modest telemetry labeling |
Gateway-class Edge (2–8 GB RAM) | Continuous similarity (BinaryAI/SAFE); SE/fuzz for deep paths | Deep/Graph IDS | DAE/GRU models for device behavior | Local PEP + cloud PDP | Deep IDS ~ 92–95% @50–100 ms; Graph ~ 90–93% @100–200 ms | Moderate ops cost; GPU optional; strong zero-day defense |
Hybrid Fleet (MCU + Edge + Cloud) | MCU integrity; Edge/Cloud similarity + provenance | MCU pre-filters + edge deep IDS | Edge-level temporal models | Fleet-wide attestation + micro-segmentation | Combined: low on-device latency, edge accuracy as Table 7 | Highest coordination payoff; requires CI/CD for models + policy |
Mission-critical IIoT (PLC/industrial PCs) | Conservative screening; evidence-attached verification | Layered guards + deep IDS at aggregation | Physical-process consistency; optional RF guard | Strong zero-trust enforcement | Link guards < 10 ms; deep IDS 50–200 ms; RF 150–300 ms |
References
- Cui, J.; Zhu, Y.; Zhong, H.; Zhang, Q.; Gu, C.; He, D. Efficient blockchain-based mutual authentication and session key agreement for cross-domain IIoT. IEEE Internet Things J. 2024, 11, 16325–16338. [Google Scholar] [CrossRef]
- May, M.C.; Glatter, D.; Arnold, D.; Pfeffer, D.; Lanza, G. IIoT system canvas—From architecture patterns towards an IIoT development framework. J. Manuf. Syst. 2024, 72, 437–459. [Google Scholar] [CrossRef]
- Hu, Y.; Jia, Q.; Yao, Y.; Lee, Y.; Lee, M.; Wang, C.; Zhou, X.; Xie, R.; Yu, F.R. Industrial Internet of Things intelligence empowering smart manufacturing: A literature review. IEEE Internet Things J. 2024, 11, 19143–19167. [Google Scholar] [CrossRef]
- Hai, T.; Sarkar, A.; Aksoy, M.; Khan, M.Z.; Alahmadi, A. Complex-valued hyperchaos-assisted vector-valued artificial neural key coordination for improving security in the industrial Internet of Things. Eng. Appl. Artif. Intell. 2024, 128, 107561. [Google Scholar] [CrossRef]
- Li, S.; Iqbal, M.; Saxena, N. Future industry Internet of Things with zero-trust security, Information Systems Frontiers. Inf. Syst. Front. 2022, 26, 1653–1666. [Google Scholar] [CrossRef]
- Stafford, V.A. Zero Trust Architecture. In NIST Special Publication 800-207; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020. [Google Scholar]
- Yaqoob, I.; Ahmed, E.; Hashem, I.; Ahmed, A.I.A.; Gani, A.; Imran, M.; Guizani, M. Internet of Things architecture: Recent advances, taxonomy, requirements, and open challenges. IEEE Wirel. Commun. 2017, 24, 10–16. [Google Scholar] [CrossRef]
- Sethi, P.; Sarangi, S.R. Internet of Things: Architectures, protocols, and applications. J. Electr. Comput. Eng. 2017, 2017, 9324035. [Google Scholar] [CrossRef]
- Olaitan, O.F.; Akatakpo, O.N.; Victor, C.O.; Emejulu, C.J. Secure and Resilient Industrial IoT Architectures for Smart Manufacturing: A Comprehensive Review. J. Eng. Res. Rep. 2025, 27, 331–344. [Google Scholar] [CrossRef]
- Sikder, A.K.; Petracca, G.; Aksu, H.; Jaeger, T.; Uluagac, A.S. A survey on sensor-based threats and attacks to smart devices and applications. IEEE Commun. Surv. Tutor. 2021, 23, 1125–1159. [Google Scholar] [CrossRef]
- Ronen, E.; O’Flynn, C.; Shamir, A.; Weingarten, A.-O. IoT goes nuclear: Creating a ZigBee chain reaction. In Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, USA, 22–24 May 2017; pp. 195–212. [Google Scholar]
- Wen, H.; Lin, Z.; Zhang, Y. FirmXRay: Detecting Bluetooth link-layer vulnerabilities from bare-metal firmware. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, Orlando, FL, USA, 9–13 November 2020; pp. 167–180. [Google Scholar]
- Jia, Y.; Xing, L.; Mao, Y.; Zhao, D.; Wang, X.; Zhao, S.; Zhang, Y. Burglars’ IoT paradise: Understanding and mitigating security risks of general messaging protocols on IoT clouds. In Proceedings of the IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 18–21 May 2020; pp. 465–481. [Google Scholar]
- Tippenhauer, N.O.; Pöpper, C.; Rasmussen, K.B.; Čapkun, S. On the requirements for successful GPS spoofing attacks. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS’11), Chicago, IL, USA, 17–21 October 2011; pp. 75–86. [Google Scholar]
- Xu, M.; Guo, J.; Yuan, H.; Yang, X. Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture. Electronics 2023, 12, 782. [Google Scholar] [CrossRef]
- Bertino, E. Zero trust architecture: Does it help? IEEE Secur. Priv. 2021, 19, 95–96. [Google Scholar] [CrossRef]
- Page, M.J.; Moher, D.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. PRISMA 2020 explanation and elaboration: Updated guidance for reporting systematic reviews. BMJ 2021, 29, 372. [Google Scholar] [CrossRef]
- CVE-2006-6125. Available online: https://www.kb.cert.org/vuls/id/403152/ (accessed on 17 June 2025).
- Su, Z.D.; Wassermann, G. The Essence of Command Injection Attacks in Web Applications. ACM Spec. Interest Group Program. Lang. 2006, 41, 372–382. [Google Scholar]
- CVE-2019-7298. Available online: https://github.com/leonW7/D-Link/blob/master/Vul_2.md (accessed on 17 June 2025).
- CVE-2018-18441. Available online: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18441 (accessed on 17 June 2025).
- Felmetsger, V.; Cavedon, L.; Kruegel, C.; Vigna, G. Toward Automated Detection of Logic Vulnerabilities in Web Applications. In Proceedings of the USENIX Security Symposium, Washington, DC, USA, 11–13 August 2010; pp. 143–160. [Google Scholar]
- CVE-2017-7923. Available online: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7923 (accessed on 17 June 2025).
- CVE-2006-4143. Available online: https://cxsecurity.com/issue/WLB-2006080097 (accessed on 17 June 2025).
- CVE-2006-1003. Available online: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1003 (accessed on 17 June 2025).
- Liu, C.; Zou, D.; Luo, P.; Zhu, B.; Jin, H. A Heuristic Framework to Detect Concurrency Vulnerabilities. In Proceedings of the ACSAC’18: 2018 Annual Computer Security Applications Conference, San Juan, Puerto Rico, 3–7 December 2018; pp. 529–541. [Google Scholar]
- CVE-2018-4027. Available online: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4027 (accessed on 17 June 2025).
- Abbaspour, S.; Sundmark, D.; Eldh, S.; Hansson, H. A Runtime Verification Tool for Detecting Concurrency Bugs in FreeRTOS Embedded Software. In Proceedings of the 17th International Symposium on Parallel and Distributed Computing, Geneva, Switzerland, 3–7 December 2018; pp. 172–179. [Google Scholar]
- Chandrasekaran, P.; Kumar, S.; Minz, R.; D’Souza, D.; Meshram, L. A Multi-Core Version of FreeRTOS Verified for Datarace and Deadlock Freedom. In Proceedings of the 2014 Twelfth ACM/IEEE Conference on Formal Methods and Models for Codesign, Lausanne, Switzerland, 19–21 October 2014; pp. 62–71. [Google Scholar]
- Yin, Z.; Ma, X.; Zheng, J.; Zhou, Y.; Bairavasundaram, L.; Pasupathy, S. An Empirical Study on Configuration Errors in Commercial and Open Source Systems. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles—SOSP’11, Cascais, Portugal, 23–26 October 2011; pp. 159–172. [Google Scholar]
- CVE-2018-19990. Available online: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19990 (accessed on 17 June 2025).
- CVE-2019-10132. Available online: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10132 (accessed on 17 June 2025).
- CVE-2019-2041. Available online: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2041 (accessed on 17 June 2025).
- CVE-2017-7916. Available online: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7916 (accessed on 17 June 2025).
- CVE-2019-9976. Available online: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9976 (accessed on 17 June 2025).
- Xu, T.Y.; Zhou, Y.Y. Systems Approaches to Tackling Configuration Errors: A Survey. ACM Comput. Surv. 2015, 47, 70. [Google Scholar] [CrossRef]
- Rabkin, A.; Katz, R. Precomputing Possible Configuration Error Diagnoses. In Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering, Lawrence, KS, USA, 6–10 November 2011; pp. 193–202. [Google Scholar]
- Xu, T.; Zhang, J.; Huang, P.; Zheng, J.; Sheng, T.; Yuan, D.; Zhou, Y.; Pasupathy, S. Do not Blame Users for Misconfigurations. In Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, Farmington, PA, USA, 3–6 November 2013; pp. 244–259. [Google Scholar]
- Chess, B.; McGraw, G. Static Analysis for Security. IEEE Secur. Priv. 2004, 2, 76–79. [Google Scholar] [CrossRef]
- Cojocar, L.; Zaddach, J.; Verdult, R.; Bos, H.; Francillon, A.; Balzarotti, D. PIE: Parser Identification in Embedded Systems. In Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, 7–11 December 2015; pp. 251–260. [Google Scholar]
- Cheng, K.; Li, Q.; Wang, L.; Chen, Q.; Zheng, Y.; Sun, L.; Liang, Z. DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware. In Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Luxembourg, 25–28 June 2018; pp. 430–441. [Google Scholar]
- Gotovchits, I.; van Tonder, R.; Brumley, D. Saluki: Finding taint-style vulnerabilities with static property checking. In Proceedings of the NDSS Workshop on Binary Analysis Research, San Diego, CA, USA, 18 February 2018. [Google Scholar]
- Redini, N.; Machiry, A.; Wang, R.; Spensky, C.; Continella, A.; Shoshitaishvili, Y.; Kruegel, C.; Vigna, G. Karonte: Detecting Insecure Multi-Binary Interactions in Embedded Firmware. In Proceedings of the 2020 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 18–21 May 2020; pp. 1544–1561. [Google Scholar]
- Stephen, J.; Savvides, S.; Sundaram, V.; Ardekani, M.; Eugster, P. STYX: Stream Processing with Trustworthy Cloud-Based Execution. In Proceedings of the Seventh ACM Symposium on Cloud Computing, Santa Clara, CA, USA, 5–7 October 2016; pp. 348–360. [Google Scholar]
- Sabt, M.; Achemlal, M.; Bouabdallah, A. Trusted Execution Environment: What it Is, and what it is not. In Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, 20–22 August 2015; pp. 57–64. [Google Scholar]
- Satyanarayanan, M. The Emergence of Edge Computing. Computer 2017, 50, 30–39. [Google Scholar] [CrossRef]
- Shi, W.; Cao, J.; Zhang, Q.; Li, Y.; Xu, L. Edge Computing: Vision and Challenges. IEEE Internet Things J. 2016, 3, 637–646. [Google Scholar] [CrossRef]
- Li, E.; Zhou, Z.; Chen, X. Edge Intelligence: On-Demand Deep Learning Model Co-Inference with Device-Edge Synergy. In Proceedings of the 2018 Workshop on Mobile Edge Communications, Budapest, Hungary, 20 August 2018; pp. 31–36. [Google Scholar]
- Khan, W.; Ahmed, E.; Sahib, I.; Yaqoob, I.; Ahmed, A. Edge Computing: A Survey. Future Gener. Comput. Syst. 2019, 97, 219–235. [Google Scholar] [CrossRef]
- Hassan, N.; Gilani, S.; Ahmed, E.; Yaqoob, I.; Imran, M. The Role of Edge Computing in Internet of Things. IEEE Commun. Mag. 2018, 56, 110–115. [Google Scholar] [CrossRef]
- Eclipse Foundation. Key Trends from the IoT Developer Survey. 2018. Available online: https://iot.eclipse.org/community/resources/iot-surveys/assets/iot-developer-survey-2018.pdf (accessed on 17 June 2025).
- Arm TrustZone. Available online: http://www.arm.com/products/processors/technologies/trustzone/index.php (accessed on 17 June 2025).
- McGillion, B.; Dettenborn, T.; Nyman, T.; Asokan, N. Open-TEE—An Open Virtual Trusted Execution Environment. In Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, 20–22 August 2015; pp. 400–407. [Google Scholar]
- Asanović, K.; Avizienis, R.; Bachrach, J.; Beamer, S.; Biancolin, D.; Celio, C.; Cook, H.; Dabbelt, P.; Hauser, J.R.; Izraelevitz, A.M.; et al. The Rocket Chip Generator; University of California: Berkeley, CA, USA, 2016. [Google Scholar]
- Al-Omari, M.; Rawashdeh, M.; Qutaishat, F.; Alshira’h, M.; Ababneh, N. An intelligent tree-based intrusion detection model for cyber security. J. Netw. Syst. Manag. 2021, 29, 20. [Google Scholar] [CrossRef]
- Sapavath, N.N.; Muhati, E.; Rawat, D.B. Prediction and detection of cyberattacks using AI model in virtualized wireless networks. In Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, Washington, DC, USA, 26–28 June 2021; pp. 97–102. [Google Scholar] [CrossRef]
- Al-Yaseen, W.L.; Othman, Z.A.; Nazri, M.Z.A. Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst. Appl. 2017, 67, 296–303. [Google Scholar] [CrossRef]
- Gu, Y.H.; Li, K.; Guo, Z.; Wang, Y. Semi-supervised K-means DDoS detection method using hybrid feature selection algorithm. IEEE Access 2019, 7, 64351–64365. [Google Scholar] [CrossRef]
- Abuali, K.M.; Nissirat, L.; Al-Samawi, A. Advancing network security with AI: SVM-based deep learning for intrusion detection. Sensors 2023, 23, 8959. [Google Scholar] [CrossRef]
- Buczak, A.L.; Guven, E. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 2016, 18, 1153–1176. [Google Scholar] [CrossRef]
- Nishiyama, T.; Kumagai, A.; Kamiya, K.; Takahashi, K. SILU: Strategy involving large-scale unlabeled logs for improving malware detector. In Proceedings of the IEEE Symp on Computers and Communications, Rennes, France, 7–10 July 2020; pp. 1–7. [Google Scholar] [CrossRef]
- Zhou, X.Y.; Belkin, M. Semi-supervised learning. Acad. Press Libr. Signal Process. 2014, 1, 1239–1269. [Google Scholar] [CrossRef]
- Liu, X.; Zhang, H.; Dong, S.; Zhang, Y. Network defense decision-making based on a stochastic game system and a deep recurrent Q-network. Comput. Secur. 2021, 111, 102480. [Google Scholar] [CrossRef]
- Gronauer, S.; Diepold, K. Multi-agent deep reinforcement learning: A survey. Artif. Intell. Rev. 2021, 55, 895–943. [Google Scholar] [CrossRef]
- Khaw, Y.; Abiri-Jahromi, A.; Fakhari Moghaddam Arani, M.; Sanner, S.; Kundur, D.; Kassouf, M. A deep learning-based cyberattack detection system for transmission protective relays. IEEE Trans. Smart Grid 2020, 12, 2554–2565. [Google Scholar] [CrossRef]
- Ho, S.; Al Jufout, S.; Dajani, K.; Mozumdar, M. A novel intrusion detection model for detecting known and innovative cyberattacks using convolutional neural network. IEEE Open J. Comput. Soc. 2021, 2, 14–25. [Google Scholar] [CrossRef]
- Nazir, A.; He, J.; Zhu, N.; Qureshi, S.S.; Qureshi, S.U.; Ullah, F.; Wajahat, A.; Pathan, M.S. A deep learning-based novel hybrid CNN-LSTM architecture for efficient detection of threats in the IoT ecosystem. Ain Shams Eng. J. 2024, 15, 102777. [Google Scholar] [CrossRef]
- Pouyanfar, S.; Sadiq, S.; Yan, Y.; Tian, H.; Tao, Y.; Presa Reyes, M.; Shyu, M.-L.; Chen, S.-C.; Iyengar, S. A survey on deep learning: Algorithms, techniques, and applications. ACM Comput. Surv. 2018, 51, 92. [Google Scholar] [CrossRef]
- Hossain, M.D.; Ochiai, H.; Fall, D.; Kadobayashi, Y. SSH and FTP brute-force attacks detection in computer networks: LSTM and machine learning approaches. In Proceedings of the 5th International Conference on Computer and Communication Systems, Shanghai, China, 15–18 May 2020; pp. 491–497. [Google Scholar] [CrossRef]
- Ma, P.; Jiang, B.; Lu, Z.; Li, N.; Jiang, Z. Cybersecurity named entity recognition using bidirectional long short-term memory with conditional random fields. Tsinghua Sci. Technol. 2020, 26, 259–265. [Google Scholar] [CrossRef]
- Bukhari, S.M.S.; Zafar, M.H.; Abou Houran, M.; Moosavi, S.K.R.; Mansoor, M.; Muaaz, M.; Sanfilippo, F. Secure and privacy-preserving intrusion detection in wireless sensor networks: Federated learning with SCNN-Bi-LSTM for enhanced reliability. Ad. Hoc. Netw. 2024, 155, 103407. [Google Scholar] [CrossRef]
- Graves, A.; Mohamed, A.R.; Hinton, G. Speech recognition with deep recurrent neural networks. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, Vancouver, BC, Canada, 26–31 May 2013; pp. 6645–6649. [Google Scholar] [CrossRef]
- Kunang, Y.; Zarkasi, A.; Nurmaini, S.; Stiawan, D. Automatic features extraction using autoencoder in intrusion detection system. In Proceedings of the International Conference on Electrical Engineering and Computer Science, Pangkal, Indonesia, 2–4 October 2018; pp. 219–224. [Google Scholar] [CrossRef]
- Ahmed, U.; Nazir, M.; Sarwar, A.; Ali, T.; Aggoune, E.M.; Shahzad, T.; Khan, M.A. Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering. Sci. Rep. 2025, 15, 1726. [Google Scholar] [CrossRef]
- Qazi, E.-U.-H.; Imran, M.; Haider, N.; Shoaib, M.; Razzak, I. An intelligent and efficient network intrusion detection system using deep learning. Comput. Electr. Eng. 2022, 99, 107764. [Google Scholar] [CrossRef]
- Hindy, H.; Tachtatzis, C.; Colin, J.-N.; Bayne, E.; Bellekens, X. Utilising deep learning techniques for effective zero-day attack detection. Electronics 2020, 9, 1684. [Google Scholar] [CrossRef]
- Ding, H.; Chen, L.; Liang, D.; Cui, X. Imbalanced data classification: A KNN and generative adversarial networks-based hybrid approach for intrusion detection. Futur. Gener. Comput. Syst. 2022, 131, 240–254. [Google Scholar] [CrossRef]
- Goodfellow, I.J.; Pouget-Abadie, J.; Mirza, M.; Xu, B.; Warde-Farley, D.; Ozair, S.; Courville, A.; Bengio, Y. Generative adversarial nets. In Proceedings of the 27th International Conference on Neural Information Processing Systems, Lake Tahoe, NV, USA, 5–10 December 2013; pp. 2672–2680. [Google Scholar]
- Seth, J.K.; Chandra, S. MIDS: Metaheuristic based intrusion detection system for cloud using k-NN and MGWO. In Advances in Computing and Data Sciences, Proceedings of the International Conference on Advances in Computing and Data Sciences, Dehradun, India, 20–21 April 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 411–420. [Google Scholar] [CrossRef]
- Meiri, R.; Zahavi, J. Using simulated annealing to optimize the feature selection problem in marketing applications. Eur. J. Oper. Res. 2006, 171, 842–858. [Google Scholar] [CrossRef]
- Kan, X.; Fan, Y.; Fang, Z.; Cao, L.; Xiong, N.; Yang, D.; Li, X. A novel IoT network intrusion detection approach based on adaptive particle swarm optimization convolutional neural network. Inf. Sci. 2021, 568, 147–162. [Google Scholar] [CrossRef]
- Chohra, A.; Shirani, P.; Karbab, E.; Debbabi, M. Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection. Comput. Secur. 2022, 117, 102684. [Google Scholar] [CrossRef]
- Elbes, M.; AlZu’bi, S.; Kanan, T.; Al-Fuqaha, A.; Hawashin, B. A survey on particle swarm optimization with emphasis on engineering and network applications. Evol. Intell. 2019, 12, 113–129. [Google Scholar] [CrossRef]
- Hyder, B.; Govindarasu, M. Optimization of cybersecurity investment strategies in the smart grid using game-theory. In Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, Washington, DC, USA, 17–20 February 2020; pp. 1–5. [Google Scholar] [CrossRef]
- Bhuiyan, T.H.; Medal, H.R.; Nandi, A.K.; Halappanavar, M. Risk-averse bi-level stochastic network interdiction model for cybersecurity risk management. Int. J. Crit. Infrastruct. Prot. 2021, 32, 100408. [Google Scholar] [CrossRef]
- Touhiduzzaman, M.; Hahn, A.; Srivastava, A.K. A diversity-based substation cyber defense strategy utilizing coloring games. IEEE Trans. Smart Grid 2018, 10, 5405–5415. [Google Scholar] [CrossRef]
- Li, D.T.; Feng, H.Y.; Gao, Y.H. A network security evaluation method based on machine learning algorithm. Electron. Des. Eng. 2021, 29, 138–142+147. [Google Scholar]
- Kumar, V.S.; Narasimhan, V.L. Using deep learning for assessing cybersecurity economic risks in virtual power plants. In Proceedings of the 7th International Conference on Electrical Energy Systems, Chennai, India, 11–13 February 2021; pp. 530–537. [Google Scholar] [CrossRef]
- Li, G.; Huang, Y.; Bie, Z.; Ding, T. Machine-learning-based reliability evaluation framework for power distribution networks. IET Gener. Transm. Distrib. 2020, 14, 2282–2291. [Google Scholar] [CrossRef]
- Yang, H.Y.; Zeng, R.Y. Method for assessment of network security situation with deep learning. J. Xidian Univ. 2021, 48, 183–190. [Google Scholar]
- Zhang, R.; Pan, Z.; Yin, Y.; Cai, Z. A Model of Network Security Situation Assessment Based on BPNN Optimized by SAA-SSA. Int. J. Digit. Crime Forensics 2022, 14, 1–18. [Google Scholar] [CrossRef]
- Wei, M.H. A new information security evaluation algorithm based on recurrent neural. J. Mianyang Teach. Coll. 2021, 40, 75–80, 87. [Google Scholar]
- Luan, D.; Tan, X.B. EWM-IFAHP: An improved network security situation assessment model. In Proceedings of the 2nd International Conference on Machine Learning and Computer Application, Shenyang, China, 17–19 December 2021; pp. 1–6. [Google Scholar]
- Heffner, C. Binwalk: Firmware Analysis Tool. 2015. Available online: https://github.com/ReFirmLabs/binwalk (accessed on 17 June 2025).
- Hemel, A. Better Unpacking Binary Files Using Contextual Information. 2019. Available online: https://www.tdcommons.org/cgi/viewcontent.cgi?article=2986&context=dpubs_series (accessed on 17 June 2025).
- Hex-Rays. IDA Pro: A Powerful Disassembler and Debugger. 2015. Available online: https://hex-rays.com/ida-pro/ (accessed on 17 June 2025).
- National Security Agency. Ghidra. 2019. Available online: https://github.com/NationalSecurityAgency/ghidra (accessed on 17 June 2025).
- Hoglund, M.G. Fuzzy Hash Algorithm. U.S. Patent 8,484,152, 9 July 2013. [Google Scholar]
- Costin, A.; Zaddach, J.; Francillon, A.; Balzarotti, D. A large-scale analysis of the security of embedded firmwares. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, 20–22 August 2014; pp. 95–110. [Google Scholar]
- Thomas, S.L.; Chothia, T.; Garcia, F.D. Stringer: Measuring the importance of static data comparisons to detect backdoors and undocumented functionality. In Proceedings of the European Symposium on Research in Computer Security, Oslo, Norway, 11–15 September 2017; pp. 513–531. [Google Scholar]
- Thomas, S.L.; Garcia, F.D.; Chothia, T. HumIDIFy: A tool for hidden functionality detection in firmware. In Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Bonn, Germany, 6–7 July 2017; pp. 279–300. [Google Scholar]
- Shoshitaishvili, Y.; Wang, R.; Hauser, C.; Kruegel, C.; Vigna, G. Firmalice: Automatic detection of authentication bypass vulnerabilities in binary firmware. In Proceedings of the Network and Distributed System Security (NDSS) Symposium, San Diego, CA, USA, 8–11 February 2015. [Google Scholar]
- Hernandez, G.; Fowze, F.; Tian, D.J.; Yavuz, T.; Butler, K.R.B. FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017; ACM: New York, NY, USA, 2017; pp. 2245–2262. [Google Scholar]
- Celik, Z.B.; Babun, L.; Sikder, A.K.; Aksu, H.; Tan, G.; McDaniel, P.; Uluagac, S. Sensitive information tracking in commodity IoT. In Proceedings of the 27th USENIX Security Symposium, Baltimore, MD, USA, 15–17 August 2018; pp. 1687–1704. [Google Scholar]
- Zheng, Y.; Song, Z.; Sun, Y.; Cheng, K.; Zhu, H.; Sun, L. An efficient greybox fuzzing scheme for Linux-based IoT programs through binary static analysis. In Proceedings of the 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC), London, UK, 29–31 October 2019; pp. 1–8. [Google Scholar]
- Andrews, A.; Oikonomou, G.; Armour, S.; Thomas, P.; Cattermole, T. IoT Firmware Version Identification Using Transfer Learning with Twin Neural Networks. arXiv 2025, arXiv:2501.06033. [Google Scholar] [CrossRef]
- Cui, A.; Costello, M.; Stolfo, S.J. When firmware modifications attack: A case study of embedded exploitation. In Proceedings of the 20th Annual Network and Distributed System Security Symp, San Diego, CA, USA, 24–27 February 2013; The Internet Society: Reston, VA, USA, 2013. [Google Scholar]
- Xu, X.; Liu, C.; Feng, Q.; Yin, H.; Song, L.; Song, D. Neural network-based graph embedding for cross-platform binary code similarity detection. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017; ACM: New York, NY, USA, 2017; pp. 363–376. [Google Scholar]
- Muench, M.; Stijohann, J.; Kargl, F.; Francillon, A.; Balzarotti, D. What you corrupt is not what you crash: Challenges in fuzzing embedded devices. In Proceedings of the 25th Annual Network and Distributed System Security Symp, San Diego, CA, USA, 18–21 February 2018; The Internet Society: Reston, VA, USA, 2018; pp. 30–43. [Google Scholar]
- Zhu, R.; Zhang, B.-F.; Mao, J.-J.; Luo, Y.; Tan, Y.-A.; Zhang, Q.-X. Determining image base of ARM firmware based on matching string addresses. Acta Electron. Sin. 2017, 45, 1475–1482. [Google Scholar]
- Cadar, C.; Dunbar, D.; Engler, D.R. KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In Proceedings of the Operating Systems Design and Implementation, San Diego, CA, USA, 8–10 December 2008; pp. 209–224. [Google Scholar]
- Shoshitaishvili, Y.; Wang, R.; Salls, C.; Stephens, N.; Polino, M.; Dutcher, A.; Grosen, J.; Feng, S.; Hauser, C.; Krügel, C.; et al. SoK: (State of) The art of war: Offensive techniques in binary analysis. In Proceedings of the 2016 IEEE Symposium on Security and Privacy, San Jose, CA, USA, 22–26 May 2016; pp. 138–157. [Google Scholar]
- Zaddach, J.; Bruno, L.; Francillon, A.; Balzarotti, D. AVATAR: A framework to support dynamic security analysis of embedded systems’ firmwares. In Proceedings of the Network and Distributed System Security (NDSS) Symposium, San Diego, CA, USA, 23–26 February 2014; pp. 1–16. [Google Scholar]
- Chipounov, V.; Kuznetsov, V.; Candea, G. S2E: A platform for in-vivo multi-path analysis of software systems. In Proceedings of the 16th International Conference Architectural Support for Programming Languages and Operating Systems, Newport Beach, CA, USA, 5–11 March 2011; pp. 265–278. [Google Scholar]
- Davidson, D.; Moench, B.; Jha, S.; Ristenpart, T. FIE on firmware: Finding vulnerabilities in embedded systems using symbolic execution. In Proceedings of the 22nd USENIX Security Symposium, Washington, DC, USA, 14–16 August 2013; pp. 463–478. [Google Scholar]
- Corteggiani, N.; Camurati, G.; Francillon, A. Inception: System-wide security testing of real-world embedded systems software. In Proceedings of the 27th USENIX Security Symposium, Baltimore, MD, USA, 15–17 August 2018; pp. 309–326. [Google Scholar]
- Yao, Y.; Zhou, W.; Jia, Y.; Zhu, L.; Liu, P.; Zhang, Y. Identifying privilege separation vulnerabilities in IoT firmware with symbolic execution. In Proceedings of the European Symposium on Research in Computer Security, Luxembourg, 23–27 September 2019; pp. 638–657. [Google Scholar]
- Zhu, L.; Fu, X.; Yao, Y.; Zhang, Y.; Wang, H. FIoT: Detecting the memory corruption in lightweight IoT device firmware. In Proceedings of the 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Rotorua, New Zealand, 5–8 August 2019; pp. 1–8. [Google Scholar]
- Wang, Z.; Luo, B.; Li, F. PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats in IoT Apps. Proc. Priv. Enhancing Technol. 2025, 2025, 776–791. [Google Scholar] [CrossRef]
- Feng, Q.; Zhou, R.; Xu, C.; Cheng, Y.; Testa, B.; Yin, H. Scalable graph-based bug search for firmware images. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; ACM: New York, NY, USA, 2016; pp. 480–491. [Google Scholar]
- Kim, J.; Yu, J.; Lee, Y.; Kim, D.D.; Yun, J. HD-FUZZ: Hardware dependency-aware firmware fuzzing via hybrid MMIO modeling. J. Netw. Comput. Appl. 2024, 224, 103835. [Google Scholar] [CrossRef]
- Antonakakis, M.; April, T.; Bailey, M.; Bernhard, M.; Bursztein, E.; Cochran, J.; Durumeric, Z.; Halderman, J.A.; Invernizzi, L.; Kallitsis, M.; et al. Understanding the Mirai botnet. In Proceedings of the of the 26th USENIX Security Symp, Vancouver, BC, Canada, 16–18 August 2017; USENIX Association: Berkeley, CA, USA, 2017; pp. 1093–1110. [Google Scholar]
- Pewny, J.; Garmany, B.; Gawlik, R.; Rossow, C.; Holz, T. Cross-architecture bug search in binary executables. In Proceedings of the 2015 IEEE Symposium on Security and Privacy, San Jose, CA, USA, 18–20 May 2015; IEEE: New York, NY, USA, 2015; pp. 709–724. [Google Scholar]
- Chen, D.; Egele, M.; Woo, M.; Brumley, D. Towards automated dynamic analysis for linux-based embedded firmware. In Proceedings of the 23rd Annual Network and Distributed System Security Symp, San Diego, CA, USA, 21–24 February 2016; The Internet Society: Reston, VA, USA, 2016; pp. 150–167. [Google Scholar]
- Kaushik, K.; Bhardwaj, A.; Dahiya, S. Framework to analyze and exploit the smart home IoT firmware. Meas. Sens. 2025, 37, 101406. [Google Scholar] [CrossRef]
- Sun, H.; Yang, Z.; Chen, X.; Xu, H.; Yuan, Z. Hardware information flow tracking based on lightweight path awareness. Comput. Secur. 2024, 147, 104072. [Google Scholar] [CrossRef]
- Zheng, Y.; Davanian, A.; Yin, H.; Song, C.; Zhu, H.; Sun, L. FIRM-AFL: High-throughput greybox fuzzing of IoT firmware via augmented process emulation. In Proceedings of the 28th USENIX Conference on Security Symp, Santa Clara, CA, USA, 14–16 August 2019; USENIX Association: Berkeley, CA, USA, 2019; pp. 1099–1114. [Google Scholar]
- Muench, M.; Nisi, D.; Francillon, A.; Balzarotti, D. Avatar2: A multi-target orchestration platform. In Proceedings of the Workshop on Binary Analysis Research, San Diego, CA, USA, 18 February 2018; Springer: Cham, Switzerland, 2018; pp. 1–11. [Google Scholar]
- Kammerstetter, M.; Platzer, C.; Kastner, W. Prospect: Peripheral proxying supported embedded code testing. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, Kyoto, Japan, 3–6 June 2014; ACM: New York, NY, USA, 2014; pp. 329–340. [Google Scholar]
- Koscher, K.; Kohno, T.; Molnar, D. SURROGATES: Enabling near-real-time dynamic analyses of embedded systems. In Proceedings of the 9th USENIX Workshop on Offensive Technologies, Washington, DC, USA, 10–11 August 2015; USENIX Association: Berkeley, CA, USA, 2015; pp. 67–80. [Google Scholar]
- Kammerstetter, M.; Platzer, C.; Kastner, W. Embedded security testing with peripheral device caching and runtime program state approximation. In Proceedings of the 10th International Conference on Emerging Security Information, Systems and Technologies, Venice, Italy, 24–28 July 2016; pp. 339–345. [Google Scholar]
- Eschweiler, S.; Yakdan, K.; Gerhards-Padilla, E. discovRE: Efficient cross-architecture identification of bugs in binary code. In Proceedings of the 23rd Annual Network and Distributed System Security Symp, San Diego, CA, USA, 21–24 February 2016; The Internet Society: Reston, VA, USA, 2016; pp. 58–79. [Google Scholar]
- Pei, K.; Xuan, Z.; Yang, J.; Jana, S.; Ray, B. TREX: Learning execution semantics from micro-traces for binary similarity. arXiv 2020, arXiv:2012.08680. [Google Scholar]
- Devlin, J.; Chang, M.-W.; Lee, K.; Toutanova, K. Bert: Pre-training of deep bidirectional transformers for language understanding. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics, Minneapolis, MN, USA, 2–7 June 2019; ACL: Stroudsburg, PA, USA, 2018; pp. 4171–4186. [Google Scholar]
- Al-Zuraiqi, A.; Greer, D. Static Analysis of IoT Firmware: Identifying Systemic Vulnerabilities with RMMIDL. In Proceedings of the International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS 2025, Co-Located with ICSE), Ottawa, ON, Canada, 3 May 2025. [Google Scholar]
- Wang, Y.; Feng, Y.; Cao, Y.; Li, H.; Feng, H.; Wang, Y. Obfuscation-Resilient Binary Code Similarity Analysis using Dominance Enhanced Semantic Graph. arXiv 2025, arXiv:2506.06161. [Google Scholar] [CrossRef]
- Talebi, S.S.M.; Tavakoli, H.; Zhang, H.; Zhang, Z.; Sani, A.; Qian, Z. Charm: Facilitating dynamic analysis of device drivers of mobile systems. In Proceedings of the 27th USENIX Conference on Security Symposium, Baltimore, MD, USA, 15–17 August 2018; USENIX Association: Berkeley, CA, USA, 2018; pp. 291–307. [Google Scholar]
- Gudala, L.; Shaik, M.; Venkataramanan, S. Leveraging machine learning for enhanced threat detection and response in zero trust security frameworks: An exploration of real-time anomaly identification and adaptive mitigation strategies. J. Artif. Intell. Res. 2021, 1, 19–45. [Google Scholar]
- Feng, B.; Mera, A.; Lu, L. P2IM: Scalable and hardware-independent firmware testing via automatic peripheral interface modeling. In Proceedings of the 29th USENIX Conference on Security Symposium, Boston, MA, USA, 12–14 August 2020; USENIX Association: Berkeley, CA, USA, 2020; p. 70. [Google Scholar]
- Andriesse, D.; Chen, X.; van der Veen, V.; Slowinska, A.; Bos, H. An in-depth analysis of disassembly on full-scale x86/x64 binaries. In Proceedings of the 25th USENIX Conference on Security Symposium, Austin, TX, USA, 10–12 August 2016; USENIX Association: Berkeley, CA, USA, 2016; pp. 583–600. [Google Scholar]
- Wu, A.; Feng, Z.; Li, X.; Xiao, J. ZTWeb: Cross site scripting detection based on zero trust. Comput. Secur. 2023, 134, 103434. [Google Scholar] [CrossRef]
- Zuo, F.; Li, X.; Zhang, Z.; Young, P.; Luo, L.; Zeng, Q. Neural machine translation inspired binary code similarity comparison beyond function pairs. arXiv 2018, arXiv:1808.04706. [Google Scholar] [CrossRef]
- Zhang, X.; Sun, W.; Pang, J.; Liu, F.; Ma, Z. Similarity metric method for binary basic blocks of cross-instruction set architecture. In Proceedings of the 2020 Workshop on Binary Analysis Research, San Diego, CA, USA, 23 February 2020; NDSS: San Diego, CA, USA, 2020; pp. 23–26. [Google Scholar]
- Godefroid, P. Micro execution. In Proceedings of the 36th International Conference on Software Engineering, Hyderabad, India, 31 May–7 June 2014; ACM: New York, NY, USA, 2014; pp. 539–549. [Google Scholar]
- Quynh, N.A.; Vu, D.H. Unicorn: Next generation CPU emulator framework. In Proceedings of the BlackHat USA, Las Vegas, NV, USA, 5 August 2015; p. 476. [Google Scholar]
- Gao, J.; Yang, X.; Jiang, Y.; Song, H.; Choo, K.-K.R.; Sun, J. Semantic learning based cross-platform binary vulnerability search for IoT devices. IEEE Trans. Ind. Inform. 2019, 17, 971–979. [Google Scholar] [CrossRef]
- Liu, B.; Huo, W.; Zhang, C.; Li, W.; Li, F.; Piao, A.; Zou, W. αDiff: Cross-version binary code similarity detection with DNN. In Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, Montpellier, France, 3–7 September 2018; ACM: New York, NY, USA, 2018; pp. 667–678. [Google Scholar]
- Mera, A.; Liu, C.; Sun, R.; Kirda, E.; Lu, L. SHiFT: Semi-hosted Fuzz Testing for Embedded Applications. In Proceedings of the 33rd USENIX Security Symposium, Philadelphia, PA, USA, 14–16 August 2024. [Google Scholar]
- Ding, S.H.; Fung, B.C.; Charland, P. Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization. In Proceedings of the 2019 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 20–22 May 2019; IEEE: New York, NY, USA, 2019; pp. 472–489. [Google Scholar]
- Clements, A.A.; Gustafson, E.; Scharnowski, T.; Grosen, P.; Fritz, D.J.; Kruegel, C.; Vigna, G.; Bagchi, S.; Payer, M. HALucinator: Firmware re-hosting through abstraction layer emulation. In Proceedings of the 29th USENIX Security Symposium, Boston, MA, USA, 12–14 August 2020; USENIX Association: Berkeley, CA, USA, 2020; pp. 1–18. [Google Scholar]
- Massarelli, L.; Di Luna, G.A.; Petroni, F.; Querzoni, L.; Baldoni, R. Safe: Self-attentive function embeddings for binary similarity. In Proceedings of the 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Gothenburg, Sweden, 19–20 June 2019; Springer: Berlin/Heidelberg, Germany, 2019; pp. 309–329. [Google Scholar]
- Church, K.W. Word2Vec. Nat. Lang. Eng. 2017, 23, 155–162. [Google Scholar] [CrossRef]
- Harrison, L.; Vijayakumar, H.; Padhye, R.; Sen, K.; Grace, M. Partemu: Enabling dynamic analysis of real-world trustzone software using emulation. In Proceedings of the 29th USENIX Conference on Security Symposium, Boston, MA, USA, 12–14 August 2020; USENIX Association: Berkeley, CA, USA, 2020; pp. 789–806. [Google Scholar]
- Gustafson, E.; Muench, M.; Spensky, C.; Redini, N.; Machiry, A.K.; Fratantonio, Y.; Balzarotti, D.; Francillon, A.; Choe, Y.R.; Krügel, C.; et al. Toward the analysis of embedded firmware through automated re-hosting. In Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses, Beijing, China, 23–25 September 2019; USENIX Association: Berkeley, CA, USA, 2019; pp. 135–150. [Google Scholar]
- Cao, C.; Guan, L.; Ming, J.; Liu, P. Device-agnostic firmware execution is possible: A concolic execution approach for peripheral emulation. In Proceedings of the Annual Computer Security Applications Conference, Austin, TX, USA, 7–11 December 2020; ACM: New York, NY, USA, 2020; pp. 746–759. [Google Scholar]
- Zhu, X.; Sobhani, P.; Guo, H. Long short-term memory over recursive structures. Proc. Mach. Learn. Res. 2015, 37, 1604–1612. [Google Scholar]
- Lin, Z.; Feng, M.; dos Santos, C.N.; Yu, M.; Xiang, B.; Zhou, B.; Bengio, Y. A structured self-attentive sentence embedding. arXiv 2017, arXiv:1703.03130. [Google Scholar] [CrossRef]
- Kim, D.; Kim, E.; Cha, S.K.; Son, S.; Kim, Y. Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned. arXiv 2020, arXiv:2011.10749. [Google Scholar] [CrossRef]
- Zhao, B.; Yang, Y.; Zheng, Y.; Quinn, A. Exploiting Control-flow Enforcement Technology for Sound and Precise Static Binary Disassembly. arXiv 2025, arXiv:2506.09426. [Google Scholar] [CrossRef]
- Shirani, P.; Collard, L.; Agba, B.L.; Lebel, B.; Debbabi, M.; Wang, L.; Hanna, A. Binarm: Scalable and efficient detection of vulnerabilities in firmware images of intelligent electronic devices. In Proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Paris, France, 28–29 June 2018; Springer: Cham, Switzerland, 2018; pp. 114–138. [Google Scholar]
- Meng, Q.; Wen, S.; Feng, C.; Tang, C. Predicting buffer overflow using semi-supervised learning. In Proceedings of the 9th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, Datong, China, 15–17 October 2016; IEEE: New York, NY, USA, 2016; pp. 1959–1963. [Google Scholar]
- Lin, W.; Guo, Q.; Yin, J.; Zuo, X.; Wang, R.; Gong, X. FSmell: Recognizing Inline Function in Binary Code. In Computer Security—ESORICS 2023, Proceedings of the 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, 25–29 September 2023; Tsudik, G., Conti, M., Liang, K., Smaragdakis, G., Eds.; Springer Nature: Cham, Switzerland, 2024; pp. 487–506. [Google Scholar]
- Mera, A.; Feng, B.; Lu, L.; Kirda, E. DICE: Automatic emulation of DMA input channels for dynamic firmware analysis. In Proceedings of the 2021 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 24–27 May 2021; IEEE: New York, NY, USA, 2021; pp. 1938–1954. [Google Scholar]
- Ghafoor, I.; Jattala, I.; Durrani, S.; Tahir, C. Analysis of OpenSSL Heartbleed vulnerability for embedded systems. In Proceedings of the 17th IEEE International Multi Topic Conference, Karachi, Pakistan, 8–10 December 2014; IEEE: New York, NY, USA, 2014; pp. 314–319. [Google Scholar]
- Guy, F.; Michael, C.; Damith, R. Ember-IO: Effective Firmware Fuzzing with Model-Free Memory Mapped IO. In Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, Melbourne, Australia, 10–14 July 2023; pp. 401–414. [Google Scholar] [CrossRef]
- Xu, Y.; Xu, Z.; Chen, B.; Song, F.; Liu, Y.; Liu, T. Patch based vulnerability matching for binary programs. In Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, Los Angeles, CA, USA, 18–22 July 2020; ACM: New York, NY, USA, 2020; pp. 376–387. [Google Scholar]
- David, Y.; Partush, N.; Yahav, E. Statistical similarity of binaries. ACM Spec. Interest Group Program. Lang. 2016, 51, 266–280. [Google Scholar]
- Chandramohan, M.; Xue, Y.; Xu, Z.; Liu, Y.; Cho, C.; Tan, H.B.K. Bingo: Cross-architecture cross-OS binary search. In Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, Seattle, WA, USA, 13–18 November 2016; ACM: New York, NY, USA, 2016; pp. 678–689. [Google Scholar]
- David, Y.; Partush, N.; Yahav, E. Firmup: Precise static detection of common vulnerabilities in firmware. ACM Spec. Interest Group Program. Lang. 2018, 53, 392–404. [Google Scholar]
- Song, L. Structure2Vec: Deep Learning for Security Analytics Over Graphs. In Proceedings of the 2018 USENIX Security and AI Networking Conference, Atlanta, GA, USA, 11 May 2018; USENIX Association: Berkeley, CA, USA, 2018. [Google Scholar]
- Jiang, L.; An, J.; Huang, H.; Tang, Q.; Nie, S.; Wu, S.; Zhang, Y. BinaryAI: Binary Software Composition Analysis via Intelligent Binary Source Code Matching. arXiv 2024, arXiv:2401.11161. [Google Scholar] [CrossRef]
- Karmakar, A.; Dey, N.; Baral, T.; Chowdhury, M.; Rehan, M. Industrial Internet of Things: A Review. In Proceedings of the 2019 International Conference on Opto-Electronics and Applied Optics (Optronix), Kolkata, India, 18–20 March 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Buck, C.; Olenberger, C.; Schweizer, A.; Volter, F.; Eymann, T. Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust. Comput. Secur. 2021, 110, 102436. [Google Scholar] [CrossRef]
- Shah, S.W.A.; Syed, N.; Shaghaghi, A.; Anwar, A.; Baig, Z.; Doss, R.R.M. LCDA: Lightweight continuous device-to-device authentication for a zero trust architecture (ZTA). Comput. Secur. 2021, 108, 102351. [Google Scholar] [CrossRef]
- Gao, J.; Yang, X.; Fu, Y.; Jiang, Y.; Sun, J. Vulseeker: A semantic learning based vulnerability seeker for cross-platform binary. In Proceedings of the 33rd IEEE/ACM International Conference on Automated Software Engineering, Montpellier, France, 3–7 September 2018; IEEE: New York, NY, USA, 2018; pp. 896–899. [Google Scholar]
- Shen, Q. Endpoint security reinforcement via integrated zero-trust systems: A collaborative approach. Comput. Secur. 2024, 136, 103537. [Google Scholar] [CrossRef]
- Konduru, P.; Nethravathi, N.P. Secure and energy-efficient routing protocol based on micro-segmentation and batch authentication. Comput. Netw. 2024, 248, 110293. [Google Scholar] [CrossRef]
- Ali, B.; Gregory, M.; Li, S.; Dib, O. Implementing zero trust security with dual fuzzy methodology for trust-aware authentication and task offloading in multi-access edge computing. Comput. Netw. 2024, 241, 110197. [Google Scholar] [CrossRef]
- Zhang, J.; Zheng, J.; Zhang, Z.; Chen, T.; Qiu, K.; Zhang, Q.; Li, Y. Hybrid isolation model for device application sandboxing deployment in zero trust architecture. Int. J. Intell. Syst. 2022, 37, 11167–11187. [Google Scholar] [CrossRef]
- Lei, W.; Pang, Z.; Wen, H.; Hou, W.; Li, W. Physical layer enhanced zero-trust security for wireless industrial internet of things. IEEE Trans. Ind. Inform. 2023, 20, 4327–4336. [Google Scholar] [CrossRef]
- Sedjelmaci, H.; Tourki, K.; Ansari, N. Enabling 6G security: The synergy of zero trust architecture and artificial intelligence. IEEE Netw. 2023, 38, 171–177. [Google Scholar] [CrossRef]
- Tsai, W.C. Field-programmable gate array-based implementation of zero-trust stream data encryption for enabling 6G-narrowband internet of things massive device access. Sensors 2024, 24, 853. [Google Scholar] [CrossRef]
- Li, P.; Ou, W.; Liang, H.; Han, W.; Zhang, Q.; Zeng, G. A zero trust and blockchain-based defense model for smart electric vehicle chargers. J. Netw. Comput. Appl. 2023, 213, 103599. [Google Scholar] [CrossRef]
- Zanasi, C.; Russo, S. Flexible zero trust architecture for the cybersecurity of industrial IoT infrastructures. Ad Hoc Netw. 2024, 156, 103414. [Google Scholar] [CrossRef]
- Daah, C.; Qureshi, A.; Awan, I.; Konur, S. Enhancing zero trust models in the financial industry through blockchain integration: A proposed framework. Electronics 2024, 13, 865. [Google Scholar] [CrossRef]
- Alagappan, A.; Venkatachary, S.K.; Andrews, L.J.B. Augmenting zero trust network architecture to enhance security in virtual power plants. Energy Rep. 2022, 8, 1309–1320. [Google Scholar] [CrossRef]
- Michael, J.; Dinolt, G.; Cohen, F.; Wijesekera, D. Can you trust zero trust? Computer 2022, 55, 103–105. [Google Scholar] [CrossRef]
- Gao, J.; Yang, X.; Fu, Y.; Jiang, Y.; Shi, H.; Sun, J. Vulseeker-pro: Enhanced semantic learning based binary vulnerability seeker with emulation. In Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Lake Buena Vista, FL, USA, 4–9 November 2018; ACM: New York, NY, USA, 2018; pp. 803–808. [Google Scholar]
- Swearingen, M.; Michael, J.; Weiss, J.; Radvanovsky, R. Resilient without zero trust. Computer 2024, 57, 120–122. [Google Scholar] [CrossRef]
- Xue, Y.; Xu, Z.; Chandramohan, M.; Liu, Y. Accurate and scalable cross-architecture cross-OS binary code search with emulation. IEEE Trans. Softw. Eng. 2018, 45, 1125–1149. [Google Scholar] [CrossRef]
- Zaid, B.; Sayeed, A.; Bala, P.; Alshehri, A.; Alanazi, A.M.; Zubair, S. Toward secure and resilient networks: A zero-trust security framework with quantum fingerprinting for devices accessing network. Mathematics 2023, 11, 2653. [Google Scholar] [CrossRef]
- Hong, S.; Xu, L.; Huang, J.; Li, H.; Hu, H.; Gu, G. SysFlow: Toward a programmable zero trust framework for system security. IEEE Trans. Inf. Forensics Secur. 2023, 18, 2794–2809. [Google Scholar] [CrossRef]
- Mustafa, R.; Sarkar, N.I.; Mohaghegh, M. A cross-layer secure and energy-efficient framework for the internet of things: A comprehensive survey. Sensors 2024, 24, 7209. [Google Scholar] [CrossRef]
- Doshi, N.; Apthorpe, N.; Feamster, N. Machine Learning DDoS Detection for Consumer Internet of Things Devices. In Proceedings of the 2018 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, 24 May 2018; pp. 29–35. [Google Scholar] [CrossRef]
- Meidan, Y.; Bohadana, M.; Mathov, Y.; Mirsky, Y.; Shabtai, A.; Breitenbacher, D.; Elovici, Y. N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders. IEEE Pervasive Comput. 2018, 17, 12–22. [Google Scholar] [CrossRef]
- Benmalek, M.; Seddiki, A. Particle Swarm Optimization-Enhanced Machine Learning and Deep Learning Techniques for Internet of Things Intrusion Detection. Data Sci. Manag. 2025; in press. [Google Scholar] [CrossRef]
Layer | Representative Threats | Consequence | Exemplary Studies |
---|---|---|---|
Firmware | Code-reuse of vulnerable libraries; logic-bombs planted during manufacturing | Remote takeover of identical product lines, supply chain worms | ZigBee light-link chain reaction [11] |
Network–Near-field (BLE/ZigBee) | Weak or “Just Works” pairing; static keys; link-layer spoofing | Device impersonation, data theft within radio range | FirmXRay BLE audit [12] |
Network–Far-field (MQTT/CoAP/AMQP) | Token hijacking; malicious topic subscription; session fixation | Cloud-to-device command injection across domains | Burglars’ IoT Paradise [13] |
Behavior | GPS, RF or ultrasonic spoofing; sensor saturation | False location/process readings; stealthy physical manipulation | GPS spoofing requirements [14] |
Trust/Policy | Implicit device trust; coarse-grained ACLs; static segmentation | Lateral movement across tiers, privilege creep | IIoT zero-trust survey [15] |
Criterion Set | Details |
---|---|
Inclusion | Peer-reviewed journal articles or full conference papers (including accepted arXiv versions); explicit focus on at least one IoT layer (firmware, network, behavior, trust) and on resource-aware design (e.g., memory, latency, power); empirical evaluation on hardware, simulation or benchmark data, or a reproducible design framework; (iv) English language. |
Exclusion | Short abstracts, posters, tutorials, patents; work limited to cloud or IT security without device component; papers that present cryptographic primitives in isolation; (iv) duplicate reports—only the most complete version retained. |
Reference | Algorithms | Application | Datasets | Accuracy | Advantages | Limitations |
---|---|---|---|---|---|---|
[55] | DT | Intrusion Detection | UNSW-NB15 | 98 | High accuracy, reduced computation time | Limited to known attack patterns |
[56] | NB | Intrusion Detection | Known/Novel Attacks | 99.8 | High precision, dynamic detection | Struggles with novel attacks |
[57] | Improved K-means | Intrusion Detection | KDD CUP99 | 95.75 | Reduced training time | Limited to specific attack types |
[58] | SKM-HFS | DDoS Detection | CICIDS2017 | - | Minimal detection delay | Lower accuracy in complex scenarios |
[61] | SILU | Intrusion Detection | Unlabeled Logs | - | Low overhead, improved detection | Requires integration with supervised methods |
[63] | DRQN | Defense Strategy | Stochastic Systems | - | Fast convergence | High computational cost |
[65] | 1D-CNN + AE | Intrusion Detection | OPAL-RT HYPERSIM | 100 | Perfect accuracy | Dataset-specific performance |
[66] | CNN | Intrusion Detection | CICIDS2017 | 99.78 | High multi-class accuracy | Complex parameter tuning |
[69] | LSTM | Intrusion Detection | CICIDS2017 | 99.88 | Effective for sequential data | Computationally intensive |
[70] | XBiLSTM-CRF | Entity Recognition | Open-source NER | 90.54 (Precision) | High precision for text analysis | Limited to specific entities |
[73] | AE | Intrusion Detection | NSL-KDD | 86.96 | Effective feature extraction | Struggles with imbalanced data |
[75] | S-NDAE | Intrusion Detection | KDD CUP99 | 99.65 | High accuracy for zero-day attacks | Dataset-specific performance |
[77] | TACGAN | Intrusion Detection | CICIDS2017 | 95.86 | Robust data augmentation | Risk of mode collapse |
[79] | MGWO + K-NN | Intrusion Detection | Solaris | 99.87 | High accuracy, effective feature selection | Slow convergence |
[81] | APSO-CNN | Intrusion Detection | Public IoT | 96 | Adaptive parameter tuning | Local optima risk |
[82] | Chameleon | Intrusion Detection | IoT-Zeek | 97.30 (F score) | High F score, ensemble learning | Complex implementation |
[84] | Game Theory | Defense Strategy | Smart Grid | - | Optimal policy allocation | Requires accurate attacker models |
[85] | Stackelberg Game | Defense Strategy | Attack Graph | - | Reduced computation time | Assumption-dependent |
[87] | FOA-SVM | Situation Assessment | - | 81.2 | Quantitative risk evaluation | Moderate accuracy |
[88] | NB + CRQ-J48 | Situation Assessment | Virtual Power Plants | 82 | Economic risk evaluation | Limited to specific contexts |
[89] | SSC + MCS | Situation Assessment | RBTS Bus 2 | - | High reliability | Computationally intensive |
[90] | DAENDD (UOSW) | Situation Assessment | NSL-KDD | - | Improved recall for imbalanced data | Longer evaluation time |
[91] | GA-PNN | Situation Assessment | KDD CUP99 | 98.46 | High training speed | Dataset-specific performance |
[92] | GRU-RNN | Situation Assessment | - | - | Robust for time-series data | High training time |
[93] | EWM-IFAHP | Situation Assessment | KDD CUP99 | 90 | High generalization | Moderate accuracy |
[59] | SVM + DL | Intrusion Detection | CSE-CIC-IDS2018 | 98.5 | Robust combination of SVM and DL for complex patterns | High computational resources needed |
[67] | CNN + LSTM | Intrusion Detection | IoTID20 | 99.2 | Captures spatial and temporal features effectively | High computational complexity |
[71] | SCNN + Bi-LSTM (Federated Learning) | Defense Strategy Optimization | WSN-DS | 97.8 | Privacy-preserving, reliable detection | Requires robust network infrastructure |
[74] | SVM, KNN, RF, DT, LSTM, ANN + Fuzzy Clustering | Intrusion Detection | CICIDS2017 | 99.1 | Adaptive feature selection with fuzzy clustering | Increased preprocessing complexity |
Technique | Target | Main Techs | Vulnerability Types | Advantages | Limitation | Representative Studies |
---|---|---|---|---|---|---|
Static Analysis | Type I Firmware, Apps | Fuzzy Hashing, Taint Analysis, CFG Analysis | Backdoors, Taint, Memory Corruption | No runtime environment needed, broad applicability | High false-positive rate, limited support for Type II/III firmware | [99,100,101,102,103,104,105,106,122,123,124] |
Symbolic Execution | Type I/II/III Firmware, Specific Platforms | Path Exploration, Constraint Solving | Memory Corruption, Auth Bypass, Privilege Separation | High precision, suitable for complex logical flaws | Path explosion, peripheral dependencies, complex setup | [108,113,115,116,117,118,119] |
Tool | Dataset | CVE Used | Precision (%) | Overhead (s) |
---|---|---|---|---|
Genius [113] | OpenSSL, BusyBox (x86, ARM, MIPS) | 3 CVEs | 85.2 | 12.5 |
Gemini [130] | Coreutils, OpenSSL (cross-architecture) | 5 CVEs | 90.1 | 8.7 |
VulSeeker [156] | IoT firmware (ARM, MIPS) | 4 CVEs | 88.6 | 10.2 |
VulSeeker-Pro [142] | IoT firmware, OpenSSL | 6 CVEs | 92.3 | 9.4 |
IoTSeeker [157] | IoT firmware (real-world) | 5 CVEs | 89.4 | 11.8 |
Asm2Vec [133] | Synthetic binaries (x86, ARM) | 2 CVEs | 87.5 | 7.9 |
SAFE [134] | OpenSSL, Coreutils (cross-ISA) | 4 CVEs | 91.8 | 8.2 |
FSmell [141] | OpenSSL, Coreutils (x86, ARM) | 3 CVEs | 90.5 | 9.1 |
BinaryAI [138] | IoT firmware, OpenSSL (cross-ISA) | 5 CVEs | 93.2 | 7.5 |
Tool | ISA Support | Compiler | Obfuscation | Inlining | Feature Type | ML Model |
---|---|---|---|---|---|---|
Genius [113] | x86, ARM, MIPS | gcc, clang | No | No | Statistical | None |
Gemini [130] | x86, ARM, MIPS | gcc, clang | Yes | No | Learning-based | GNN (Structure2Vec) |
VulSeeker [156] | ARM, MIPS | gcc | Yes | No | Learning-based | GNN |
VulSeeker-Pro [142] | ARM, MIPS | gcc, clang | Yes | Yes | Hybrid | GNN + Emulation |
IoTSeeker [157] | ARM, MIPS | gcc | Yes | No | Learning-based | GNN |
Asm2Vec [133] | x86, ARM | gcc, clang | Yes | No | Learning-based | PV-DM |
SAFE [134] | x86, ARM, MIPS | gcc, clang | Yes | Yes | Learning-based | Self-Attention |
FSmell [141] | x86, ARM | gcc, clang | Yes | Yes | Learning-based | CNN + CFG Analysis |
BinaryAI [138] | x86, ARM, MIPS | gcc, clang | Yes | Yes | Learning-based | Deep Learning |
Approach | Dataset | Accuracy | Latency | Trust Target |
---|---|---|---|---|
Lightweight IDS [178] | Network traffic logs | 85–90% | Low (<10 ms) | Known threats |
Deep Learning IDS [182] | Behavioral data | 92–95% | Moderate (50–100 ms) | Zero-day attacks |
Graph-Based IDS [184] | Device interaction graphs | 90–93% | High (100–200 ms) | Lateral movement |
RF-Spectrum Analytics [16] | Wireless signal data | 88–92% | High (150–300 ms) | Wireless threats |
Micro-Segmentation [193] | Trust-level policies | 87–91% | Low (<20 ms) | Access control |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Altaibek, M.; Issainova, A.; Aidynov, T.; Kuttymbek, D.; Abisheva, G.; Nurusheva, A. A Survey of Cross-Layer Security for Resource-Constrained IoT Devices. Appl. Sci. 2025, 15, 9691. https://doi.org/10.3390/app15179691
Altaibek M, Issainova A, Aidynov T, Kuttymbek D, Abisheva G, Nurusheva A. A Survey of Cross-Layer Security for Resource-Constrained IoT Devices. Applied Sciences. 2025; 15(17):9691. https://doi.org/10.3390/app15179691
Chicago/Turabian StyleAltaibek, Mamyr, Aliya Issainova, Tolegen Aidynov, Daniyar Kuttymbek, Gulsipat Abisheva, and Assel Nurusheva. 2025. "A Survey of Cross-Layer Security for Resource-Constrained IoT Devices" Applied Sciences 15, no. 17: 9691. https://doi.org/10.3390/app15179691
APA StyleAltaibek, M., Issainova, A., Aidynov, T., Kuttymbek, D., Abisheva, G., & Nurusheva, A. (2025). A Survey of Cross-Layer Security for Resource-Constrained IoT Devices. Applied Sciences, 15(17), 9691. https://doi.org/10.3390/app15179691