Javascript must be enabled to continue!
Embedded and IoT Devices Firmware Security
View through CrossRef
The Internet of Things (IoT) has gone a long way since its inception. However, the standardization process in IoT systems for IoT safety solutions is still in its early stages. Lots of studies have been conducted on its quality evaluation to address threats to IoT across different layers. However, most current works have failed to take into their consideration of the security aspects of the firmware in the IoT ecosystem. The lack of a comprehensive survey on IoT firmware security aims to highlight the important reasons for a firmware insecurity in IoT, list vulnerabilities, and perform an in-depth review of the key analysis techniques. Such rapid development has made IoT and embedded systems become interesting targets for potential attackers, especially the firmware attacks. This Article hereby presents some information related to the device firmware as started by highlighting the importance of the firmware security, classifying the vulnerabilities in IoT, the processes of analyzing the firmware vulnerabilities through some Open source tools, and as illustrated by analyzing some firmwares of the popular devices.
Ho Chi Minh City University of Technology and Engineering
Title: Embedded and IoT Devices Firmware Security
Description:
The Internet of Things (IoT) has gone a long way since its inception.
However, the standardization process in IoT systems for IoT safety solutions is still in its early stages.
Lots of studies have been conducted on its quality evaluation to address threats to IoT across different layers.
However, most current works have failed to take into their consideration of the security aspects of the firmware in the IoT ecosystem.
The lack of a comprehensive survey on IoT firmware security aims to highlight the important reasons for a firmware insecurity in IoT, list vulnerabilities, and perform an in-depth review of the key analysis techniques.
Such rapid development has made IoT and embedded systems become interesting targets for potential attackers, especially the firmware attacks.
This Article hereby presents some information related to the device firmware as started by highlighting the importance of the firmware security, classifying the vulnerabilities in IoT, the processes of analyzing the firmware vulnerabilities through some Open source tools, and as illustrated by analyzing some firmwares of the popular devices.
.
Related Results
Key Learnings from Pre-Silicon Safety Compliant Bootrom Firmware Development
Key Learnings from Pre-Silicon Safety Compliant Bootrom Firmware Development
Safety needs of real-time embedded devices are becoming a must in automotive and industrial markets. The BootROM firmware being part of the device drives the need for the firmware ...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Internet of things (IoT) technology plays a vital role in the current technologies because IoT develops a network by integrating different kinds of objects and sensors to create th...
Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control
Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control
The Internet of Things (IoT) has provided substantial enhancements to the communication of sensors, actuators, and their controllers, particularly in the field of home automation. ...
A Review on Security and Privacy Issues in IoT Devices
A Review on Security and Privacy Issues in IoT Devices
In our everyday lives, the IoT is everywhere. They are used for the monitoring and documentation of environmental improvements, fire safety and even other useful roles in our homes...
Anomaly Detection in IoT: Recent Advances, AI and ML Perspectives and Applications
Anomaly Detection in IoT: Recent Advances, AI and ML Perspectives and Applications
IoT comprises sensors and other small devices interconnected locally and via the Internet. Typical IoT devices collect data from the environment through sensors, analyze it and act...
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
REVIEWING THE IMPACT OF EMBEDDED SYSTEMS IN MEDICAL DEVICES IN THE USA
REVIEWING THE IMPACT OF EMBEDDED SYSTEMS IN MEDICAL DEVICES IN THE USA
The integration of embedded systems in medical devices has revolutionized the healthcare landscape in the United States, fostering advancements in patient care, diagnostics, and tr...

