This website describes the research conducted on behalf of the INTERSCT project. The goal of the project behind this site was to write general guidelines for securing all IoT devices and applications by pentesting multiple IoT devices. The main focus was on smart office and smart industry cases, but the guidelines are written in a more general way, but based on the specific findings. “INTERSECT addresses this societal and technical challenge by adopting a completely new, foundational perspective that brings together security research (e.g. design, defence, attack generation) with legal and criminology approaches”(INTERSECT, z.d.). Intersect is funded by the NWO, the national dutch organisation for research. “NWO’s core task is performed in the NWO domains, research institutes and regional bodies: encouraging quality and innovation in the sciences”(About, z.d.). The added value of this site to the intersect vision will be writing guidelines based on findings made during the research project connected to this site.


The Stakeholders for the project are Fontys and INTERSCT. Specifically Teade Punter, Casper Schellekens and Mark Madsen.

In general, the stakeholder wanted to have security guidelines for the most common flaws of IoT devices. The stakeholder demanded that the new documentation that will be used to secure their devices needs to be clear and easy to read. This is because it will be applied to real-life situations. The guidelines cover the most used IoT devices, because of their broad range of use and therefore their great potential for critical exploits. It is expected that the most commonly found exploits are covered and that section-specific exploits will be named and/or highlighted for the user’s research.


The bibliography according to this page is