The State of Embedded-Device Security (Spoiler Alert: It's Bad)

@article{Viega2012TheSO,
  title={The State of Embedded-Device Security (Spoiler Alert: It's Bad)},
  author={John Viega and Hugh Thompson},
  journal={IEEE Security & Privacy},
  year={2012},
  volume={10},
  pages={68-70}
}
Embedded-systems security is a mess, and the embedded-software industry needs to start focusing on it. This will involve moving beyond just the technology to rethink our assumptions of how people will actually use and maintain embedded devices. 
Highly Cited
This paper has 26 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 19 extracted citations

A security-enhanced design methodology for embedded systems

2013 International Conference on Security and Cryptography (SECRYPT) • 2013
View 3 Excerpts
Highly Influenced

Security and Privacy Implementations within the AnyPLACE Energy Management Solution

2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA) • 2018
View 1 Excerpt

LO-FAT: Low-Overhead control Flow ATtestation in hardware

2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC) • 2017

C-FLAT: Control-Flow Attestation for Embedded Systems Software

ACM Conference on Computer and Communications Security • 2016
View 1 Excerpt

Practical DRAM PUFs in Commodity Devices

IACR Cryptology ePrint Archive • 2016
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-4 of 4 references

Cameras May Open Up the Board Room to Hackers,

N. Perlroth
New York Times, • 2012

Hoping to Teach a Lesson, Researchers Release Exploits for Critical Infrastructure Software,

K. Zetter
Wired, • 2012

Railroad Association Says Hack

K. Zetter
Memo Was Inaccurate,” Wired, • 2012

Similar Papers

Loading similar papers…