IoT/Embedded vs. Security : Learn from the Past, Apply to the Present, Prepare for the Future
Costin, A. (2018). IoT/Embedded vs. Security : Learn from the Past, Apply to the Present, Prepare for the Future. In S. Balandin, T. Hämäläinen, & T. Tyutina (Eds.), FRUCT : Proceedings of the 22nd Conference of Open Innovations Association (pp. 412-414). FRUCT Oy. Proceedings of Conference of Open Innovations Association FRUCT. https://fruct.org/publications/acm22/files/Cos.pdf
Authors
Date
2018Copyright
© 2018, IEEE.
It is expected there will be 50 billion IoT/embedded
connected devices by 2020. At the same time, multiple recent studies revealed that IoT/embedded devices and their
software/firmware is plagued with weaknesses and vulnerabilities. Moreover, various recent and prominent attacks, such as
the Mirai botnet targeting Commercial Off-The-Shelf (COTS)
IoT/embedded devices, and the ROCA attack targeting secure
embedded hardware chips (in their many form-factors), clearly
demonstrate the need to secure the many layers and components of the highly fragmented and heterogeneous ecosystem of
IoT/embedded devices. In this paper we aim to explore, discuss
and exemplify some research aspects and directions that could
be used to help improve the long-term security posture for
IoT/embedded devices.
Publisher
FRUCT OyParent publication ISBN
978-952-68653-4-8Conference
Conference of Open Innovations AssociationIs part of publication
FRUCT : Proceedings of the 22nd Conference of Open Innovations AssociationISSN Search the Publication Forum
2305-7254
Original source
https://fruct.org/publications/acm22/files/Cos.pdfPublication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/31231180
Metadata
Show full item recordCollections
License
Related items
Showing items with similar title or keywords.
-
Attacking TrustZone on devices lacking memory protection
Stajnrod, Ron; Ben Yehuda, Raz; Zaidenberg, Nezer Jacob (Springer Science and Business Media LLC, 2022)ARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the ... -
Kyberfyysisten järjestelmien turvallisuusuhat
Haarala, Lassi (2024)Kyberfyysiset järjestelmät ovat muovautuneet hyvin isoksi osaksi elämäämme, vaikka tämä ei ole aina niin näkyvää. Näitä järjestelmiä löytyy esimerkiksi kodeista, autoista tai työpaikoista ja ne saattavat olla vastuussa ... -
Sulautettujen tietoturvakomponenttien käyttö pilviympäristössä
Kuokkanen, Ville (2021)Sulautetut järjestelmät ovat usein hyvin vähäresurssisia, jonka takia tavallisesti käytettyjä salausmenetelmiä ei ole mielekästä käyttää. Erilliset tietoturvakomponentit mahdollistavat salauksen käytön myös prosessointiteholtaan ... -
Towards Seamless IoT Device-Edge-Cloud Continuum : Software Architecture Options of IoT Devices Revisited
Taivalsaari, Antero; Mikkonen, Tommi; Pautasso, Cesare (Springer, 2022)In this paper we revisit a taxonomy of client-side IoT software architectures that we presented a few years ago. We note that the emergence of inexpensive AI/ML hardware and new communication technologies are broadening ... -
Tiny Machine Learning for Resource-Constrained Microcontrollers
Immonen, Riku; Hämäläinen, Timo (Hindawi Limited, 2022)We use 250 billion microcontrollers daily in electronic devices that are capable of running machine learning models inside them. Unfortunately, most of these microcontrollers are highly constrained in terms of computational ...