[Review] How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices
This paper performs the first in-depth investigation on the user-data disposal of used IoT devices, and finds that:
- Most users lack the awareness of disposing used IoT devices.
- IoT devices collect more sensitive data than users expect, and current data protections of used IoT devices are inadequate.
- The disposal methods of used IoT devices are often ineffective.
Implementation:
RQ1: Which kinds of sensitive data reside in used IoT devices?
RQ2: Which methods can be used to dispose of sensitive data?
RQ3: Are existing disposal methods effective in erasing the sensitive data?
![[Review] How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices](/blog/images/13/cover.png)
![[Review] MINER: A Hybrid Data-Driven Approach for REST API Fuzzing](/blog/images/12/cover.png)
![[Review] Testing Database Engines via Pivoted Query Synthesis](/blog/images/11/cover.jpeg)
![[Review] Squirrel: Testing Database Management Systems with Language Validity and Coverage Feedback](/blog/images/10/cover.png)






![[Review] Assisting Static Analysis with Large Language Models: A ChatGPT Experiment](/blog/images/42/cover.png)
![[Review] Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths](/blog/images/41/cover.png)
![[Review] GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis](/blog/images/40/cover.png)
![[Review] MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation](/blog/images/39/cover.png)
![[Review] One Simple API Can Cause Hundreds of Bugs: An Analysis of Refcounting Bugs in All Modern Linux Kernels](/blog/images/38/cover.png)