2015 13th Annual Conference on Privacy, Security and Trust (PST) (2015)
July 21, 2015 to July 23, 2015
Dorottya Papp , CrySyS Lab, Budapest University of Technology and Economics, Hungary
Zhendong Ma , Digital Safety & Security Department, AIT Austrian Institute of Technology, Austria
Levente Buttyan , CrySyS Lab, Budapest University of Technology and Economics, Hungary
Embedded systems are the driving force for technological development in many domains such as automotive, healthcare, and industrial control in the emerging post-PC era. As more and more computational and networked devices are integrated into all aspects of our lives in a pervasive and “invisible” way, security becomes critical for the dependability of all smart or intelligent systems built upon these embedded systems. In this paper, we conduct a systematic review of the existing threats and vulnerabilities in embedded systems based on public available data. Moreover, based on the information, we derive an attack taxonomy for embedded systems. We envision that the findings in this paper provide a valuable insight of the threat landscape facing embedded systems. The knowledge can be used for a better understanding and the identification of security risks in system analysis and design.
Embedded systems, Taxonomy, Protocols, Cryptography, Authentication
D. Papp, Z. Ma and L. Buttyan, "Embedded systems security: Threats, vulnerabilities, and attack taxonomy," 2015 13th Annual Conference on Privacy, Security and Trust (PST), Izmir, Turkey, 2015, pp. 145-152.