Name:
Academic_Poster_Picture.jpg
Size:
2.066Mb
Format:
JPEG image
Request:
Author Original
Authors
Underhill, PaulAffiliation
University of ChesterPublication Date
2023-03
Metadata
Show full item recordAbstract
The Internet of Things (IoT) has raised cybersecurity and privacy issues, notably about altering embedded software. This poster investigates the feasibility of using Read-Only Memory (ROM) at a low level to modify IoT devices while remaining undetectable to users and security systems. The study explores the vulnerabilities in embedded code and firmware, which are frequently proprietary and inaccessible, making them challenging to safeguard efficiently. The methodology uses a black-box forensic technique to acquire software, identify functions, and create test cases to assess potential alterations. The findings aim to contribute to a better understanding of IoT security concerns, emphasising the importance of upgraded firmware protection methods. This research highlights the challenges of detecting low-level attacks on IoT devices and provides insights into improving embedded system security.Citation
Underhill, P. (2023, March). IoT embedded software manipulation [Poster abstract]. Postgraduate Academic Research Conference (PARC), University of Chester, Chester.Type
Conference ContributionSponsors
UnfundedCollections
Except where otherwise noted, this item's license is described as https://creativecommons.org/licenses/by-nc-nd/4.0/