Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems
Costin, A. (2022). Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 419-443). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_18
Published in
Computational Methods in Applied SciencesAuthors
Date
2022Discipline
TekniikkaSecure Communications Engineering and Signal ProcessingEngineeringSecure Communications Engineering and Signal ProcessingCopyright
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses.
Publisher
SpringerParent publication ISBN
978-3-030-91292-5Is part of publication
Cyber Security : Critical Infrastructure ProtectionISSN Search the Publication Forum
1871-3033Keywords
cybersecurity firmware binare vulnerabilities exploits reverse engineering protocols cyber-physical systems critical infrastructure aviation ADS-B video surveillance CCTV remote firing systems wireless pyrotechnics RF Zigbee esineiden internet protokollat (tietoliikenne) takaisinmallinnus asejärjestelmät infrastruktuurit valvontajärjestelmät ilmailu kyberturvallisuus sulautettu tietotekniikka haavoittuvuus
Publication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/117601511
Metadata
Show full item recordCollections
License
Related items
Showing items with similar title or keywords.
-
HALE-IoT : HArdening LEgacy Internet-of-Things devices by retrofitting defensive firmware modifications and implants
Carrillo-Mondejar, J.; Turtiainen, Hannu; Costin, Andrei; Martinez, J.L.; Suarez-Tangil, G. (IEEE, 2022)Internet-Of-Things (IoT) devices and their firmware are notorious for their lifelong vulnerabilities. As device infection increases, vendors also fail to release patches at a competitive pace. Despite security in IoT being ... -
Cyberattacks Against Critical Infrastructure Facilities and Corresponding Countermeasures
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Springer, 2022)Critical infrastructure (CI) is a vital asset for the economy and society’s functioning, covering sectors such as energy, finance, healthcare, transport, and water supply. Governments around the world invest a lot of effort ... -
Backward-compatible Software Upgrades for ADS-B and AIS To Support ECDSA-Secured Protocols
Saleem, Ahsan; Turtiainen, Hannu; Costin, Andrei; Hämäläinen, Timo (Academic Conferences International Ltd, 2024)During the past few decades, the aviation, maritime, aerospace, and search-and-rescue domains have witnessed tremendous improvement thanks to technological, digitalization and Internet of Things (IoT) advances such as ... -
Cyber Situational Awareness in Critical Infrastructure Organizations
Pöyhönen, Jouni; Rajamäki, Jyri; Nuojua, Viivi; Lehto, Martti (Springer, 2021)The capability related to cybersecurity plays an ever-growing role on overall national security and securing the functions vital to society. The national cyber capability is mainly composed by resilience of companies running ... -
A View on Vulnerabilities Within IoT Devices in the Smart Home Environment
Nykänen, Annika; Costin, Andrei (Springer Nature Switzerland, 2023)The number of different devices connected to the Internet is constantly increasing. There is a high demand for these devices, and their benefits are clear for certain groups of users. Some of these devices, the Internet ...