S. P. Veed, S. M. Daftary, B. Singh, M. Rudra, S. Berhe (University of the Pacific), M. Maynard (Data Independence LLC) F. Khomh (Polytechnique Montreal)

The quality of software update systems is critical for the performance, security, and functionality of IoT devices. Grounded in NIST IR 8259A standards, which emphasize secure updates, device integrity, and minimal disruption, this paper evaluates how these requirements align with user expectations and challenges. By examining the standard’s technical requirements, the study identifies gaps where user feedback can inform improvements in update mechanisms. A survey of 52 participants provides feedback into user behaviors and concerns regarding software updates. Key challenges include performance degradation, dissatisfaction with interface changes, and inconsistent cross-platform experiences. Users prioritize security alongside performance and feature updates but express reservations about system slowdowns and time-intensive update processes. The findings highlight the need for secure, fast, and user-focused update systems that align with NIST standards. Proposed strategies include lightweight updates, context-aware notifications, and rigorous testing protocols to improve system reliability and user compliance.

View More Papers

Fuzzing Space Communication Protocols

Stephan Havermans (IMDEA Software Institute), Lars Baumgaertner, Jussi Roberts, Marcus Wallum (European Space Agency), Juan Caballero (IMDEA Software Institute)

Read More

The Power of Words: A Comprehensive Analysis of Rationales...

Yusra Elbitar (CISPA Helmholtz Center for Information Security), Alexander Hart (CISPA Helmholtz Center for Information Security), Sven Bugiel (CISPA Helmholtz Center for Information Security)

Read More

ERW-Radar: An Adaptive Detection System against Evasive Ransomware by...

Lingbo Zhao (Institute of Information Engineering, Chinese Academy of Sciences), Yuhui Zhang (Institute of Information Engineering, Chinese Academy of Sciences), Zhilu Wang (Institute of Information Engineering, Chinese Academy of Sciences), Fengkai Yuan (Institute of Information Engineering, CAS), Rui Hou (Institute of Information Engineering, Chinese Academy of Sciences)

Read More

Was This You? Investigating the Design Considerations for Suspicious...

Sena Sahin (Georgia Institute of Technology), Burak Sahin (Georgia Institute of Technology), Frank Li (Georgia Institute of Technology)

Read More