TY - DATA T1 - Data underlying the publication: “Bits and Pieces: Piecing Together Factors of IoT Vulnerability Exploitation" PY - 2025/05/23 AU - Arwa Al Alsadi UR - DO - 10.4121/69d111e7-30e6-4206-b27d-22a5f4e33722.v1 KW - IoT KW - Exploits in the wild KW - CVEs KW - NVD KW - PoC KW - Hacking forum discussion KW - Regression Model N2 -

This repository contains the source code for our exploit prediction model, as well as detailed descriptions and links for each dataset used in this study:


1. Model source code: The R code used for predicting and explaining exploitation in IoT vulnerabilities is included. All necessary instructions for running the model are provided in the README file within the ZIP archive.


2. You can use the following sources to collect the data used in the model:

2.1. IoT Vulnerabilities:

2.1.1 VARIoT: https://www.variot.eu/


2.2. Targeted IoT Vulnerabilities:

2.2.1. VirusTotal: https://www.virustotal.com

2.2.2. CISA KEV: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

2.2.3. VulnCheck KEV: https://vulncheck.com/kev

2.2.4. AttackerKB: https://attackerkb.com

2.2.5. Google Project Zero: https://googleprojectzero.blogspot.com/

2.2.6. Honeypots such as IoTPOT and X-Pot: https://sec.ynu.codes/iot/


2.3. Vulnerability Features:

2.3.1. NVD: https://nvd.nist.gov/


2.4. Exploitability Features:

2.4.1. ExploitDB: https://www.exploit-db.com/


2.5. Hacking Community Features:

2.5.1 CrimeBB: https://www.cambridgecybercrime.uk/datasets.html


ER -