2018
DOI: 10.1109/jiot.2018.2875240
|View full text |Cite
|
Sign up to set email alerts
|

Reverse Engineering IoT Devices: Effective Techniques and Methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(15 citation statements)
references
References 17 publications
0
15
0
Order By: Relevance
“… Physical damage: an attacker can prevent a mist node from working properly or can neutralize it completely by totally or partially destroying it. Malicious code injection: by physically accessing the mist node an attacker could change the code controlling the node and achieve total access to the mist layer [ 51 ]. Sleep deprivation attack: an attacker tries to maximize the energy consumption of a node, which can have a massive effect on the overall energy consumption of the mist layer and thus reduce the life of battery-operated nodes [ 52 ].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“… Physical damage: an attacker can prevent a mist node from working properly or can neutralize it completely by totally or partially destroying it. Malicious code injection: by physically accessing the mist node an attacker could change the code controlling the node and achieve total access to the mist layer [ 51 ]. Sleep deprivation attack: an attacker tries to maximize the energy consumption of a node, which can have a massive effect on the overall energy consumption of the mist layer and thus reduce the life of battery-operated nodes [ 52 ].…”
Section: Related Workmentioning
confidence: 99%
“…Malicious code injection: by physically accessing the mist node an attacker could change the code controlling the node and achieve total access to the mist layer [ 51 ].…”
Section: Related Workmentioning
confidence: 99%
“…The attacker will need physical access to the device in order to exploit the vulnerability. This existing firmware is used for further analysis as well as reverse-engineering [11]. The attacker can be able to craft the custom firmware and update the flash memory directly by bypassing into any software level checks if any, during normal firmware update process [12].…”
Section: Universal Serial Bus (Usb)mentioning
confidence: 99%
“…Another important aspect of IoT security is that IoT nodes must be robust against the use of reverse engineering [15,16] and/or malware such as the Mirai botnet [17]. Thus, it is necessary to ensure the integrity and authenticity of user data in addition to its confidentiality.…”
Section: Introductionmentioning
confidence: 99%