The prevalence of IoT device vulnerabilities underlines the importance of understanding the characteristics of the existing crowd-reported vulnerabilities and investigating how these characteristics can help to detect unknown vulnerabilities.
Since the information about IoT vulnerabilities itself is relatively scarce, we leverage the PoC to understand the characteristics of IoT vulnerabilities
We put the supplementary material of the paper here.