17th IEEE International Multi Topic Conference 2014 2014
DOI: 10.1109/inmic.2014.7097358
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of OpenSSL Heartbleed vulnerability for embedded systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…However, while IoT brings technological growth, it unintendedly exposes missioncritical systems to novel vulnerabilities [4]- [6] number of IoT cyberattacks increased by 300% in 2019 [7], while the discovered software vulnerabilities rose from 1.6k to 100k [8]. The consequence can be detrimental, as indicated in [9], the Heartbleed bug [10] can lead to a leakage of up to 64K memory, threatening not only personal but also organizational information security. Besides, Shellshock is a bash commandline interface shell bug, but it has existed for 30 years and remains a threat to enterprises today [11], [12].…”
Section: Introductionmentioning
confidence: 99%
“…However, while IoT brings technological growth, it unintendedly exposes missioncritical systems to novel vulnerabilities [4]- [6] number of IoT cyberattacks increased by 300% in 2019 [7], while the discovered software vulnerabilities rose from 1.6k to 100k [8]. The consequence can be detrimental, as indicated in [9], the Heartbleed bug [10] can lead to a leakage of up to 64K memory, threatening not only personal but also organizational information security. Besides, Shellshock is a bash commandline interface shell bug, but it has existed for 30 years and remains a threat to enterprises today [11], [12].…”
Section: Introductionmentioning
confidence: 99%
“…A vulnerability located within open source software may be of particular value as it may allow exploitation on multiple kinds of systems. The OpenSSL 'Heartbleed' exploit (CVE-2014-0160) [15] and Linux Kernel Copy-On-Write, known as 'Dirty COW', (CVE-2016-5195) [16] are well known and heavily exploited examples. Separately, attacks against communication links and data in transit have been demonstrated, which may cause delay in communication as well as compromise of privacy, or denial-of-service entirely [17], [18], [19].…”
Section: Introductionmentioning
confidence: 99%
“…However, protecting the smart grid only at the transport layer leaves the network and its links open to cyber security attacks such as DoS, which can produce an eavesdropping of network management messages and ban the users from accessing the service. This fact is not aligned with the high reliability feature that is required in the smart grid [33]. For this reason, the smart grid really urges multilevel security, even above the transport layer [1,2].…”
mentioning
confidence: 99%