IoT/Embedded vs. Security : Learn from the Past, Apply to the Present, Prepare for the Future
Costin, A. (2018). IoT/Embedded vs. Security : Learn from the Past, Apply to the Present, Prepare for the Future. In S. Balandin, T. Hämäläinen, & T. Tyutina (Eds.), FRUCT : Proceedings of the 22nd Conference of Open Innovations Association (pp. 412-414). FRUCT Oy. Retrieved from https://fruct.org/publications/acm22/files/Cos.pdf
Authors
Date
2018Copyright
© 2018, IEEE.
It is expected there will be 50 billion IoT/embedded
connected devices by 2020. At the same time, multiple recent studies revealed that IoT/embedded devices and their
software/firmware is plagued with weaknesses and vulnerabilities. Moreover, various recent and prominent attacks, such as
the Mirai botnet targeting Commercial Off-The-Shelf (COTS)
IoT/embedded devices, and the ROCA attack targeting secure
embedded hardware chips (in their many form-factors), clearly
demonstrate the need to secure the many layers and components of the highly fragmented and heterogeneous ecosystem of
IoT/embedded devices. In this paper we aim to explore, discuss
and exemplify some research aspects and directions that could
be used to help improve the long-term security posture for
IoT/embedded devices.
Publisher
FRUCT OyParent publication ISBN
978-952-68653-4-8Conference
Conference of Open Innovations AssociationIs part of publication
FRUCT : Proceedings of the 22nd Conference of Open Innovations AssociationISSN Search the Publication Forum
2305-7254Keywords
Original source
https://fruct.org/publications/acm22/files/Cos.pdfMetadata
Show full item recordCollections
License
Related items
Showing items with similar title or keywords.
-
Towards Automated Classification of Firmware Images and Identification of Embedded Devices
Costin, Andrei; Zarras, Apostolis; Francillon, Aurélien (Springer, 2017)Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full ... -
Attacking TrustZone on devices lacking memory protection
Stajnrod, Ron; Ben Yehuda, Raz; Zaidenberg, Nezer Jacob (Springer Science and Business Media LLC, 2021)ARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the ... -
Lääkintälaitteiden kyberturvallisuuden standardit ja testaaminen
Kallio, Heli (2017)Tietotekniikkaa sisältävät lääkintälaitteet pitävät meidät hengissä, jos kehomme pettää. Esimerkiksi ostoskeskuksissa olevat älykkäät defibrillaattorit antavat maallikoillekin mahdollisuuden antaa tehokasta ensiapua ... -
Self-management in distributed systems : smart adaptive framework for pervasive computing environments
Nagy, Michal (University of Jyväskylä, 2013) -
Sulautettujen tietoturvakomponenttien käyttö pilviympäristössä
Kuokkanen, Ville (2021)Sulautetut järjestelmät ovat usein hyvin vähäresurssisia, jonka takia tavallisesti käytettyjä salausmenetelmiä ei ole mielekästä käyttää. Erilliset tietoturvakomponentit mahdollistavat salauksen käytön myös prosessointiteholtaan ...