Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems
Costin, A. (2022). Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 419-443). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_18
Julkaistu sarjassa
Computational Methods in Applied SciencesTekijät
Päivämäärä
2022Oppiaine
TekniikkaSecure Communications Engineering and Signal ProcessingEngineeringSecure Communications Engineering and Signal ProcessingTekijänoikeudet
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses.
Julkaisija
SpringerEmojulkaisun ISBN
978-3-030-91292-5Kuuluu julkaisuun
Cyber Security : Critical Infrastructure ProtectionISSN Hae Julkaisufoorumista
1871-3033Asiasanat
cybersecurity firmware binare vulnerabilities exploits reverse engineering protocols cyber-physical systems critical infrastructure aviation ADS-B video surveillance CCTV remote firing systems wireless pyrotechnics RF Zigbee esineiden internet protokollat (tietoliikenne) takaisinmallinnus asejärjestelmät infrastruktuurit valvontajärjestelmät ilmailu kyberturvallisuus sulautettu tietotekniikka haavoittuvuus
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/117601511
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
HALE-IoT : HArdening LEgacy Internet-of-Things devices by retrofitting defensive firmware modifications and implants
Carrillo-Mondejar, J.; Turtiainen, Hannu; Costin, Andrei; Martinez, J.L.; Suarez-Tangil, G. (IEEE, 2022)Internet-Of-Things (IoT) devices and their firmware are notorious for their lifelong vulnerabilities. As device infection increases, vendors also fail to release patches at a competitive pace. Despite security in IoT being ... -
Cyberattacks Against Critical Infrastructure Facilities and Corresponding Countermeasures
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Springer, 2022)Critical infrastructure (CI) is a vital asset for the economy and society’s functioning, covering sectors such as energy, finance, healthcare, transport, and water supply. Governments around the world invest a lot of effort ... -
Backward-compatible Software Upgrades for ADS-B and AIS To Support ECDSA-Secured Protocols
Saleem, Ahsan; Turtiainen, Hannu; Costin, Andrei; Hämäläinen, Timo (Academic Conferences International Ltd, 2024)During the past few decades, the aviation, maritime, aerospace, and search-and-rescue domains have witnessed tremendous improvement thanks to technological, digitalization and Internet of Things (IoT) advances such as ... -
Cyber Situational Awareness in Critical Infrastructure Organizations
Pöyhönen, Jouni; Rajamäki, Jyri; Nuojua, Viivi; Lehto, Martti (Springer, 2021)The capability related to cybersecurity plays an ever-growing role on overall national security and securing the functions vital to society. The national cyber capability is mainly composed by resilience of companies running ... -
A View on Vulnerabilities Within IoT Devices in the Smart Home Environment
Nykänen, Annika; Costin, Andrei (Springer Nature Switzerland, 2023)The number of different devices connected to the Internet is constantly increasing. There is a high demand for these devices, and their benefits are clear for certain groups of users. Some of these devices, the Internet ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.