Mobile and Embedded Software Attacks

Author(s):  
Aurélien Francillon ◽  
Sam L. Thomas ◽  
Andrei Costin

AbstractThe goal of this chapter is to introduce the reader to the domain of bug discovery in embedded systems which are at the core of the Internet of Things. Embedded software has a number of particularities which makes it slightly different to general purpose software. In particular, embedded devices are more exposed to software attacks but have lower defense levels and are often left unattended. At the same time, analyzing their security is more difficult because they are very “opaque”, while the execution of custom and embedded software is often entangled with the hardware and peripherals. These differences have an impact on our ability to find software bugs in such systems. This chapter discusses how software vulnerabilities can be identified, at different stages of the software life-cycle, for example during development, during integration of the different components, during testing, during the deployment of the device, or in the field by third parties.


2010 ◽  
Vol 130 (3) ◽  
pp. 496-502
Author(s):  
Yoshiyuki Anan ◽  
Toyoshiro Nakashima ◽  
Kazunori Iwata ◽  
Hiroshi Yonemitsu ◽  
Tetsu Yoshioka ◽  
...  

2014 ◽  
Author(s):  
Sudipta Chattopadhyay ◽  
Abhik Roychoudhury ◽  
Jakob Rosén ◽  
Petru Eles ◽  
Zebo Peng
Keyword(s):  

Author(s):  
Gabriel de Souza Pereira Moreira ◽  
Denis Ávila Montini ◽  
Daniela América da Silva ◽  
Felipe Rafael Motta Cardoso ◽  
Luiz Alberto Vieira Dias ◽  
...  

2006 ◽  
Vol 41 (7) ◽  
pp. 44-53 ◽  
Author(s):  
Nathan Cooprider ◽  
John Regehr

Sign in / Sign up

Export Citation Format

Share Document