2018
DOI: 10.1007/978-3-319-75208-2_1
|View full text |Cite
|
Sign up to set email alerts
|

Opening Pandora’s Box: Effective Techniques for Reverse Engineering IoT Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 20 publications
0
13
0
Order By: Relevance
“…Medical devices, however, are known to be more sensitive to malware and lowquality code than other connected devices, owing to the lengthy compliance process that makes in-the-field upgrades very difficult [12]. Finally, embedded device firmware has been shown to suffer often from poor security mechanisms and thus is more susceptible to various forms of attacks than traditional computer systems [23]. The various factors described above lead us to believe that this attack scenario is highly probable.…”
Section: Malicious Hardware/firmware Implantmentioning
confidence: 99%
“…Medical devices, however, are known to be more sensitive to malware and lowquality code than other connected devices, owing to the lengthy compliance process that makes in-the-field upgrades very difficult [12]. Finally, embedded device firmware has been shown to suffer often from poor security mechanisms and thus is more susceptible to various forms of attacks than traditional computer systems [23]. The various factors described above lead us to believe that this attack scenario is highly probable.…”
Section: Malicious Hardware/firmware Implantmentioning
confidence: 99%
“…Generic hardware components are often produced overseas, which is cost effective but leads to insecurities and a lack of hardening for specific end-use purposes. Hardware vulnerabilities could be exploited on-site, or they can be implanted during manufacturing and supply-chain processes for widespread and unknown security issues (Fayans et al, 2020;Ender et al, 2020;Shwartz et al, 2017;Anderson and Kuhn, 1997). Such hardware issues are unpatchable and will remain with devices forever until newer devices can be manufactured to replace older versions.…”
Section: Laboratories and Equipmentmentioning
confidence: 99%
“…Third-party manufacturers and device vendors implement firmware in these hardware components. Embedded device firmware has been shown to be more susceptible to cyber-attacks than other forms of software (Shwartz et al, 2017). In-field upgrades are difficult to implement, and like hardware, firmware and operating systems of sequencing systems can be maliciously altered within the supply chain (Fayans et al, 2020).…”
Section: Laboratories and Equipmentmentioning
confidence: 99%
“…Generic hardware components are often produced in various countries, which is cost effective but leads to insecurities and a lack of hardening for specific end-use purposes. Hardware vulnerabilities could be exploited on-site, or they can be implanted during manufacturing and supply-chain processes for widespread and unknown security issues ( Anderson and Kuhn, 1997 ; Shwartz et al, 2017 ; Ender et al, 2020 ; Fayans et al, 2020 ). Such hardware issues are unpatchable and will remain with devices forever until newer devices can be manufactured to replace older versions.…”
Section: The Genetic Information Threat Landscapementioning
confidence: 99%