2022
DOI: 10.1016/j.ijcip.2022.100552
|View full text |Cite
|
Sign up to set email alerts
|

A taxonomy of IoT firmware security and principal firmware analysis techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 48 publications
0
4
0
Order By: Relevance
“…In fact, several attacks, such as the Mirai attacks, [13,14] have caused enormous revenue losses and, as a result, identifying IoT device-level vulnerabilities [64] has emerged as a serious challenge. Similarly, the quantity of literature review papers published in recent years [16,19,21,[24][25][26][27][28][29][30][31][32][33][34][35]65,89] corroborates the increasing research interest in IoT vulnerability. Figure 7 shows the trends in research publication by type.…”
Section: Analysis Of Research Trends In Iot Vulnerability Assessmentmentioning
confidence: 58%
“…In fact, several attacks, such as the Mirai attacks, [13,14] have caused enormous revenue losses and, as a result, identifying IoT device-level vulnerabilities [64] has emerged as a serious challenge. Similarly, the quantity of literature review papers published in recent years [16,19,21,[24][25][26][27][28][29][30][31][32][33][34][35]65,89] corroborates the increasing research interest in IoT vulnerability. Figure 7 shows the trends in research publication by type.…”
Section: Analysis Of Research Trends In Iot Vulnerability Assessmentmentioning
confidence: 58%
“…The authentication process identifies the device, whereas authorization grants permissions and both of these must exist in IoT devices to perform their roles. The result of these types of attacks could be unauthorized access and access to the network boundaries that connect within the device [27][28][29].…”
Section: Insecure Interfacesmentioning
confidence: 99%
“…Consists of unconfigured firmware, unencrypted delivery, no anti-rollback mechanisms, and no notifications of security updates, which leads to exploit the threat on the IoT software. For instance, the software updates can be replaced with malicious code by an attacker if there is an unsecured update mechanism [27,30,31].…”
Section: Lack Of Update Mechanismmentioning
confidence: 99%
“…With the exponential increase of connected devices and data volume, security has become an escalating challenge in IoT. Specifically, introduction of new security updates to IoT devices after the manufacturing stage is not only difficult but also often overlooked [6][7][8].…”
Section: Introductionmentioning
confidence: 99%