Finding Software Bugs in Embedded Devices
Francillon, A., Thomas, S. L., & Costin, A. (2021). Finding Software Bugs in Embedded Devices. In J. Hernandez-Castro, & G. Avoine (Eds.), Security of Ubiquitous Computing Systems : Selected Topics (pp. 183-197). Springer. https://doi.org/10.1007/978-3-030-10591-4_11
Date
2021Copyright
© The Author(s) 2021
The goal of this chapter is to introduce the reader to the domain of bug discovery in embedded systems which are at the core of the Internet of Things. Embedded software has a number of particularities which makes it slightly different to general purpose software. In particular, embedded devices are more exposed to software attacks but have lower defense levels and are often left unattended. At the same time, analyzing their security is more difficult because they are very “opaque”, while the execution of custom and embedded software is often entangled with the hardware and peripherals. These differences have an impact on our ability to find software bugs in such systems. This chapter discusses how software vulnerabilities can be identified, at different stages of the software life-cycle, for example during development, during integration of the different components, during testing, during the deployment of the device, or in the field by third parties.
Publisher
SpringerParent publication ISBN
978-3-030-10590-7Is part of publication
Security of Ubiquitous Computing Systems : Selected TopicsKeywords
Publication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/28932210
Metadata
Show full item recordCollections
License
Related items
Showing items with similar title or keywords.
-
Towards Automated Classification of Firmware Images and Identification of Embedded Devices
Costin, Andrei; Zarras, Apostolis; Francillon, Aurélien (Springer, 2017)Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full ... -
Sulautettujen laitteiden laitteisto- ja ohjelmistoturvallisuus
Vähälummukka, Antti (2020)Tässä työssä selvitetään millaisia laitteisto- ja ohjelmistoturvallisuutta lisääviä ominaisuuksia on käytettävissä nykyaikaisissa sulautettujen laitteiden käyttämissä mikro-ohjaimissa, sekä miten niiden avulla voidaan ... -
Attacking TrustZone on devices lacking memory protection
Stajnrod, Ron; Ben Yehuda, Raz; Zaidenberg, Nezer Jacob (Springer Science and Business Media LLC, 2021)ARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the ... -
Security of firmware update mechanisms within SOHO routers
Kolehmainen, Santtu (2019)Purpose of this thesis was to analyze the state of firmware update security within SOHO (Small Office/Home Office) routers as anecdotal claims of insecure routers are common and firmware updates are critical to the overall ... -
Liikuntateknologiat ja niiden käyttö
Mengus, Mikael (2020)Liikuntateknologiat ovat yleistyneet huomattavasti viimeisten kymmenien vuosien ajan. Kiitos GPS:än yleistymisen, sekä teknologian halventumisen, lähes kuka tahansa voi omistaa älylaitteen, joka toimii samalla liikunnan ...