Versions Compared


  • This line was added.
  • This line was removed.
  • Formatting was changed.


We already live in a world where mobile devices outnumber traditional computers, and IoT stand to dwarf mobile computing in terms of the sheer number of devices within the next few years. As vulnerability discovery tools and techniques evolve into this space, so must our tools and processes for coordination and disclosure. Assumptions built into the CVD process about disclosure timing, coordination channels, development cycles, scanning, patching, and so on, will need to be reevaluated in the light of hardware-based systems that are likely to dominate the future internet.


< 8.1 Vulnerability IDs and DBs | 9. Conclusion >


  1. A. Householder, "Vulnerability Discovery for Emerging Networked Systems," 20 November 2014. [Online]. Available: [Accessed 16 May 2017].
  2. D. Geer, "Security of Things," 14 May 2014. [Online]. Available: [Accessed 16 May 2017].