An empirical study of IoT security aspects at sentence-level in developer textual discussions
نویسندگان
چکیده
IoT is a rapidly emerging paradigm that now encompasses almost every aspect of our modern life. As such, ensuring the security devices crucial. can differ from traditional computing, thereby design and implementation proper measures be challenging in devices. We observed developers discuss their security-related challenges developer forums like Stack Overflow(SO). However, we find discussions also buried inside non-security SO. In this paper, aim to understand face while applying practices techniques have two goals: (1) Develop model automatically SO, (2) Study output learn about challenges. First, download 53K posts SO contain IoT. Second, manually labeled 5,919 sentences as 1 or 0. Third, use benchmark investigate suite deep learning transformer models. The best performing called SecBot. Fourth, apply SecBot on entire around 30K related sentences. Fifth, topic modeling Then label categorize topics. Sixth, analyze evolution topics found based retraining RoBERTa. offers F1-Score 0.935, there are six error categories misclassified samples by was mostly wrong when keywords/contexts were ambiguous (e.g., gateway simple gateway), (3) 9 grouped into three categories: Software, Hardware, Network, (4) highest number belongs software security, followed network security.
منابع مشابه
An Empirical Study of Consumer Adoption of IoT Service
IoT is considered a next generation digital revolution to connect things with an embedded system to the Internet. The IoT technology is reshaping how people access information; IoT products and services will be a significant part of consumer infrastructure of smart retailing, smart homes, and smart cities, which will change consumers’ lives and their behaviors (Dutton, 2014; Brody and Pureswara...
متن کاملan exploratory study of differential item functioning (dif) in efl reading comprehension
بررسی دلایل عملکرد متفاوت سوالات آزمون درک مطلب به زبان خارجی تاریخچه ی تحقیق درباره ی منابع عملکرد مختلف سوالات (دیف) در آزمون درک مطلب پر است از مجموعه ای از متغیرهای فرضیه ای که چند مورد از مهمترین آنها عبارتند از: جنسیت، آشنایی با موضوع متن، علاقه به موضوع یا محتوای متن، حدس زدن، و عوامل بافت اجتماعی (پی 2004؛ زومبو و گلین 2005). مطالعه حاضر با استناد به فلسفه ی انکارپذیری پوپر عوامل ذکر...
15 صفحه اولAn Empirical Study of Textual Key-Fingerprint Representations
Many security protocols still rely on manual fingerprint comparisons for authentication. The most well-known and widely used key-fingerprint representation are hexadecimal strings as used in various security tools. With the introduction of end-to-end security in WhatsApp and other messengers, the discussion on how to best represent key-fingerprints for users is receiving a lot of interest. We c...
متن کاملHuman Aspects of Information Security: An Empirical Study of Intentional versus Actual Behavior
A significant amount of empirical research has been conducted on the socio-economic (sociological, psychological, economic) aspects of information security such asthe phenomena of individuals who are willing to take security measures, but often do not. There is a growing body of research relating to individual behaviour and decision-making. To promote effective information security measures, th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information & Software Technology
سال: 2022
ISSN: ['0950-5849', '1873-6025']
DOI: https://doi.org/10.1016/j.infsof.2022.106970