and potential approaches. Computers & Security,
116:102669.
CSA (2022). Matter security and privacy fundamentals,
v. 1.0. Technical report, Connectivity Standards Al-
liance.
CSA (2023). Cybersecurity Labelling Scheme. Cyber Se-
curity Agency of Singapore, https://csa.gov.sg/.
Dupont, S., Yautsiukhin, A., Ginis, G., Iadarola, G., Fag-
nano, S., Martinelli, F., Ponsard, C., Legay, A.,
and Massonet, P. (2023). Product Incremental Se-
curity Risk Assessment Using DevSecOps Practices.
In Computer Security. ESORICS 2022 International
Workshops, pages 666–685, Cham. Springer Interna-
tional Publishing.
ECSO (2017). European Cyber Security Certification, A
Meta-Scheme Approach v1.0. WG1 – Standardisa-
tion, certification, labelling and supply chain manage-
ment, ESCO.
ETSI (2020). Cyber Security for Consumer Internet of
Things: Baseline Requirements v2.1.1. ETSI EN 303
645, ETSI.
ETSI (2021). Cyber Security for Consumer Internet of
Things: Conformance Assessment of Baseline Re-
quirements v1.1.1. ETSI TS 103 701, ETSI.
GitHub Inc. (2023). GitHub REST API documentation.
https://docs.github.com/en/rest.
Hao, D., Lan, T., Zhang, H., Guo, C., and Zhang, L. (2013).
Is this a bug or an obsolete test? In Castagna, G., ed-
itor, ECOOP 2013 – Object-Oriented Programming,
pages 602–628, Berlin, Heidelberg. Springer Berlin
Heidelberg.
ioXt Alliance (2023). ioXT Internet of secure things.
https://www.ioxtalliance.org/.
Johari, R., Kaur, I., Tripathi, R., and Gupta, K. (2020). Pen-
etration Testing in IoT Network. In 2020 5th Interna-
tional Conference on Computing, Communication and
Security (ICCCS), pages 1–7.
Kaksonen, R., Halunen, K., Laakso, M., and R
¨
oning, J.
(2023a). Transparent security method for automat-
ing IoT security assessments. In Information Security
Practice and Experience, pages 138–153, Singapore.
Springer Nature Singapore.
Kaksonen, R., Halunen, K., and R
¨
oning, J. (2022). Com-
mon Cybersecurity Requirements in IoT Standards,
Best Practices, and Guidelines. In Proceedings of the
7th International Conference on Internet of Things,
Big Data and Security - Volume 1: IoTBDS,, pages
149–156. INSTICC, SciTePress.
Kaksonen, R., Halunen, K., and R
¨
oning, J. (2023b). Vul-
nerabilities in IoT Devices, Backends, Applications,
and Components. In ICISSP - 9th International Con-
ference on Information Systems Security and Privacy.
INSTICC, SciTePress.
Kaksonen, R., J
¨
arvenp
¨
a
¨
a, T., Pajukangas, J., Mahalean, M.,
and R
¨
oning, J. (2021). 100 Popular Open-Source
Infosec Tools. In 36th IFIP International Confer-
ence on ICT Systems Security and Privacy Protection
(SEC), volume AICT-625 of ICT Systems Security and
Privacy Protection, pages 181–195. Springer Interna-
tional Publishing.
Khurshid, A., Alsaaidi, R., Aslam, M., and Raza, S. (2022).
EU Cybersecurity Act and IoT Certification: Land-
scape, Perspective and a Proposed Template Scheme.
IEEE Access, 10:129932–129948.
Lally, G. and Sgandurra, D. (2018). Towards a Framework
for Testing the Security of IoT Devices Consistently.
In Saracino, A. and Mori, P., editors, Emerging Tech-
nologies for Authorization and Authentication, pages
88–102, Cham. Springer International Publishing.
Lonetti, F., Bertolino, A., and Di Giandomenico, F. (2023).
Model-based security testing in IoT systems: A
Rapid Review. Information and Software Technology,
164:107326.
Mallouli, W., Bessayah, F., Cavalli, A., and Benameur, A.
(2008). Security Rules Specification and Analysis
Based on Passive Testing. pages 2078–2083.
Matheu, S. N., Hern
´
andez-Ramos, J. L., Skarmeta, A. F.,
and Baldini, G. (2020). A Survey of Cybersecurity
Certification for the Internet of Things. ACM Comput.
Surv., 53(6).
Matheu-Garc
´
ıa, S. N., Hern
´
andez-Ramos, J. L., Skarmeta,
A. F., and Baldini, G. (2019). Risk-based automated
assessment and testing for the cybersecurity certifica-
tion and labelling of IoT devices. Computer Standards
& Interfaces, 62:64–83.
Matheu Garc
´
ıa, S. N., S
´
anchez-Cabrera, A., Schiavone, E.,
and Skarmeta, A. (2024). Integrating the manufac-
turer usage description standard in the modelling of
cyber–physical systems. Computer Standards & In-
terfaces, 87:103777.
Odvarko, Jan (2007). HTTP Archive
1.2 Specification. Software is hard,
http://www.softwareishard.com/blog/har-12-spec/.
OWASP (2018). OWASP Top 10 Internet of
Things. https://wiki.owasp.org/index.php/
OWASP Internet of Things Project.
Raspberry Pi Ltd (2023). Raspberry PI.
https://www.raspberrypi.com/.
Rekhter, Y. and Li, T. (2019). RFC 8520: Manufacturer
Usage Description Specification. RFC, RFC Editor.
Rollo, J. (2017). D1.2 List of tools and techniques applica-
ble for high and medium assurance for efficient assur-
ance. Report DS-01-731456 / D1.2 / V1.0, Project:
Compositional security certification for medium to
high-assurance COTS-based systems in environments
with emerging threats.
Ruuvi Innovations Ltd (2022). Statement of compliance for
the Cybersecurity Label, 2022-06-06.
Ruuvi Innovations Ltd (2023). Ruuvi home page.
https://ruuvi.com.
Siboni, S., Sachidananda, V., Meidan, Y., Bohadana, M.,
Mathov, Y., Bhairav, S., Shabtai, A., and Elovici, Y.
(2019). Security Testbed for Internet-of-Things De-
vices. IEEE Transactions on Reliability, 68(1):23–44.
Takanen, A., Demott, J., Miller, C., and Kettunen, A.
(2018). Fuzzing for Software Security Testing and
Quality Assurance, Second Edition.
Traficom (2023). Finnish Cybersecurity Label. Finnish
Transport and Communications Agency Traficom,
https://tietoturvamerkki.fi/en/.
Automating IoT Security Standard Testing by Common Security Tools
53