dc.contributor.author | Francillon, Aurélien | |
dc.contributor.author | Thomas, Sam L. | |
dc.contributor.author | Costin, Andrei | |
dc.contributor.editor | Hernandez-Castro, Julio | |
dc.contributor.editor | Avoine, Gildas | |
dc.date.accessioned | 2021-01-20T12:20:47Z | |
dc.date.available | 2021-01-20T12:20:47Z | |
dc.date.issued | 2021 | |
dc.identifier.citation | Francillon, A., Thomas, S. L., & Costin, A. (2021). Finding Software Bugs in Embedded Devices. In J. Hernandez-Castro, & G. Avoine (Eds.), <i>Security of Ubiquitous Computing Systems : Selected Topics</i> (pp. 183-197). Springer. <a href="https://doi.org/10.1007/978-3-030-10591-4_11" target="_blank">https://doi.org/10.1007/978-3-030-10591-4_11</a> | |
dc.identifier.other | CONVID_28932210 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/73705 | |
dc.description.abstract | The goal of this chapter is to introduce the reader to the domain of bug discovery in embedded systems which are at the core of the Internet of Things. Embedded software has a number of particularities which makes it slightly different to general purpose software. In particular, embedded devices are more exposed to software attacks but have lower defense levels and are often left unattended. At the same time, analyzing their security is more difficult because they are very “opaque”, while the execution of custom and embedded software is often entangled with the hardware and peripherals. These differences have an impact on our ability to find software bugs in such systems. This chapter discusses how software vulnerabilities can be identified, at different stages of the software life-cycle, for example during development, during integration of the different components, during testing, during the deployment of the device, or in the field by third parties. | en |
dc.format.extent | 265 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Springer | |
dc.relation.ispartof | Security of Ubiquitous Computing Systems : Selected Topics | |
dc.rights | CC BY 4.0 | |
dc.subject.other | embedded devices | |
dc.subject.other | security | |
dc.subject.other | software bugs | |
dc.title | Finding Software Bugs in Embedded Devices | |
dc.type | book part | |
dc.identifier.urn | URN:NBN:fi:jyu-202101191152 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/BookItem | |
dc.date.updated | 2021-01-19T13:15:06Z | |
dc.relation.isbn | 978-3-030-10590-7 | |
dc.type.coar | http://purl.org/coar/resource_type/c_3248 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 183-197 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © The Author(s) 2021 | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | bookPart | |
dc.subject.yso | ohjelmointivirheet | |
dc.subject.yso | tietoturva | |
dc.subject.yso | sulautettu tietotekniikka | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27382 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5461 | |
dc.rights.url | https://creativecommons.org/licenses/by/4.0/ | |
dc.relation.doi | 10.1007/978-3-030-10591-4_11 | |
dc.type.okm | A3 | |