Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems
Costin, A. (2022). Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 419-443). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_18
Published inComputational Methods in Applied Sciences
DisciplineTekniikkaSecure Communications Engineering and Signal ProcessingEngineeringSecure Communications Engineering and Signal Processing
Embargoed until: 2024-04-01Request copy from author
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses.
Parent publication ISBN978-3-030-91292-5
Is part of publicationCyber Security : Critical Infrastructure Protection
cybersecurity firmware binare vulnerabilities exploits reverse engineering protocols cyber-physical systems critical infrastructure aviation ADS-B video surveillance CCTV remote firing systems wireless pyrotechnics RF Zigbee esineiden internet protokollat (tietoliikenne) takaisinmallinnus asejärjestelmät infrastruktuurit valvontajärjestelmät ilmailu kyberturvallisuus sulautettu tietotekniikka haavoittuvuus
Publication in research information system
MetadataShow full item record
Showing items with similar title or keywords.
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Springer, 2022)Critical infrastructure (CI) is a vital asset for the economy and society’s functioning, covering sectors such as energy, finance, healthcare, transport, and water supply. Governments around the world invest a lot of effort ...
HALE-IoT : HArdening LEgacy Internet-of-Things devices by retrofitting defensive firmware modifications and implants Carrillo-Mondejar, J.; Turtiainen, Hannu; Costin, Andrei; Martinez, J.L.; Suarez-Tangil, G. (IEEE, 2022)Internet-Of-Things (IoT) devices and their firmware are notorious for their lifelong vulnerabilities. As device infection increases, vendors also fail to release patches at a competitive pace. Despite security in IoT being ...
On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems : An Attacker Perspective on the Availability of ADS-B Safety- and Mission-Critical Systems Khandker, Syed; Turtiainen, Hannu; Costin, Andrei; Hämäläinen, Timo (Institute of Electrical and Electronics Engineers (IEEE), 2022)Automatic dependent surveillance-broadcast (ADS-B) is a key air surveillance technology and a critical component of next-generation air transportation systems. It significantly simplifies aircraft surveillance technology ...
Pöyhönen, Jouni; Rajamäki, Jyri; Nuojua, Viivi; Lehto, Martti (Springer, 2021)The capability related to cybersecurity plays an ever-growing role on overall national security and securing the functions vital to society. The national cyber capability is mainly composed by resilience of companies running ...
Simola, Jussi; Lehto, Martti (Academic Conferences International, 2019)There is fundamental need in EU-level to develop common alarm procedures and emergency response models with preventive functions which work well from local to national level and from national to international level. European ...