A Systematic Literature Review on Vulnerability Detection Approaches for IoT Mobile Applications. Zongo Meyo, undefined, Morales, R., Pete, I., & Gu�h�neuc, Y. Internet of Things Journal (IoTJ), 13(3):3965–3987, IEEE CS Press, February, 2026. 23 pages.
A Systematic Literature Review on Vulnerability Detection Approaches for IoT Mobile Applications [pdf]Paper  abstract   bibtex   
Internet of Things (IoT) systems are pervasive and increasingly managed through mobile applications. However, poorly designed mobile applications can expose sensitive information to external adversaries. Mitigating such vulnerabilities requires both developers and researchers to apply well-established practices and design secure systems based on clearly defined approaches for vulnerability detection. Although databases such as Open Worldwide Application Security Project (OWASP) and Common Vulnerabilities and Exposures (CVE) catalog known IoT vulnerabilities, no standardized methodology exists for detecting security weaknesses in IoT mobile applications (IoTMAs) during IoTMA development. Building on prior research, our research objectives are to: 1) identify, classify, and prioritize critical security vulnerabilities in IoTMAs; 2) survey existing vulnerability detection approaches (VDAs) for IoTMAs; 3) critically evaluate the effectiveness of existing VDAs by analyzing their evaluation methodologies and dataset validation; and 4) formulate evidence-based recommendations based on the limitations of existing methods for detecting security vulnerabilities in IoTMAs. We performed a systematic literature review (SLR) from selected primary studies (PSs). From 856 papers retrieved from six academic databases—Scopus, Springer, and Engineering Village (EV), which hosts Compendex (covering IEEE Xplore and the ACM Digital Library), and Inspec (IET)—we reviewed 39 research papers. Our findings include: 1) identification of 52 security vulnerabilities, eight critical (i.e., reported in at least four studies); 2) discovery of seven distinct VDAs; 3) comprehensive VDAs effectiveness evaluation using empirical metrics, accuracy assessments, reproducibility analysis, comparative studies, and validation across diverse IoTMAs marketplaces; and 4) recommendations to guide developers and practitioners in selecting appropriate VDAs, thereby supporting the development of secure IoTMAs and enhanced penetration testing. Our study raises awareness of state-of-the-art VDAs, identifies research gaps in existing approaches, and provides recommendations to enhance existing techniques and guide new development, supporting software engineers in making informed technique selection decisions.

Downloads: 0