The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - Sept.-Oct. (2012 vol.10)
pp: 68-70
John Viega , Perimeter E-Security
Hugh Thompson , People Security
ABSTRACT
Embedded-systems security is a mess, and the embedded-software industry needs to start focusing on it. This will involve moving beyond just the technology to rethink our assumptions of how people will actually use and maintain embedded devices.
INDEX TERMS
Embedded systems, Computer security, Software development, Performance evaluation, SCADA systems, computer security, embedded devices, embedded systems, embedded-device security, SCADA, Stuxnet
CITATION
John Viega, Hugh Thompson, "The State of Embedded-Device Security (Spoiler Alert: It's Bad)", IEEE Security & Privacy, vol.10, no. 5, pp. 68-70, Sept.-Oct. 2012, doi:10.1109/MSP.2012.134
REFERENCES
1. K. Zetter, “Hoping to Teach a Lesson, Researchers Release Exploits for Critical Infrastructure Software,” Wired,19 Jan. 2012; www.wired.com/threatlevel/2012/01SCADA-exploits .
2. K. Zetter, “Railroad Association Says Hack Memo Was Inaccurate,” Wired,26 Jan. 2012; www.wired.com/threatlevel/2012/01railroad-memo .
3. N. Perlroth, “Cameras May Open Up the Board Room to Hackers,” New York Times,22 Jan. 2012; www.nytimes.com/2012/01/23/technologyflaws-in-videoconferencing-systems-put-boardrooms-at-risk.html?_r=2 .
4. A. Cui and S.J. Stolfo, “A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan,” Proc. 26th Ann. Computer Security Applications Conf. (ACSAC 10), ACM, 2010, pp. 97–106; http://ids.cs.columbia.edu/sites/default/ filespaper-acsac.pdf.
41 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool