Loading...
Thumbnail Image
Item

IoT embedded software manipulation

Underhill, Paul
Citations
Altmetric:
Advisors
Editors
Other Contributors
EPub Date
Publication Date
2023-03
Submitted Date
Other Titles
Abstract
The Internet of Things (IoT) has raised cybersecurity and privacy issues, notably about altering embedded software. This poster investigates the feasibility of using Read-Only Memory (ROM) at a low level to modify IoT devices while remaining undetectable to users and security systems. The study explores the vulnerabilities in embedded code and firmware, which are frequently proprietary and inaccessible, making them challenging to safeguard efficiently. The methodology uses a black-box forensic technique to acquire software, identify functions, and create test cases to assess potential alterations. The findings aim to contribute to a better understanding of IoT security concerns, emphasising the importance of upgraded firmware protection methods. This research highlights the challenges of detecting low-level attacks on IoT devices and provides insights into improving embedded system security.
Citation
Underhill, P. (2023, March). IoT embedded software manipulation [Poster abstract]. Postgraduate Academic Research Conference (PARC), University of Chester, Chester.
Publisher
Journal
Research Unit
DOI
PubMed ID
PubMed Central ID
Type
Conference Contribution
Language
Description
Series/Report no.
ISSN
EISSN
ISBN
ISMN
Gov't Doc
Test Link
Sponsors
Unfunded
Additional Links
Embedded videos