Leaving Your Things Unattended is No Joke! Memory Bus Snooping and Open Debug Interface Exploits

01/19/2022
by   Yang Su, et al.
0

Internet of Things devices are widely adopted by the general population. People today are more connected than ever before. The widespread use and low-cost driven construction of these devices in a competitive marketplace render Internet-connected devices an easier and attractive target for malicious actors. This paper demonstrates non-invasive physical attacks against IoT devices in two case studies in a tutorial style format. The study focuses on demonstrating the: i)exploitation of debug interfaces, often left open after manufacture; and ii)the exploitation of exposed memory buses. We illustrate a person could commit such attacks with entry-level knowledge, inexpensive equipment, and limited time (in 8 to 25 minutes).

READ FULL TEXT

page 2

page 3

page 4

page 5

page 8

research
12/01/2020

Lightweight Encryption for the Low Powered IoT Devices

The internet of things refers to the network of devices connected to the...
research
12/11/2017

IDIoT: Securing the Internet of Things like it's 1994

Over 20 billion Internet of Things devices are set to come online by 202...
research
02/16/2023

Signaling Storm Detection in IIoT Network based on the Open RAN Architecture

The Industrial Internet of Things devices due to their low cost and comp...
research
07/17/2018

Can Blockchain Protect Internet-of-Things?

In the Internet-of-Things, the number of connected devices is expected t...
research
03/30/2022

Internet of Things Protection and Encryption: A Survey

The Internet of Things (IoT) has enabled a wide range of sectors to inte...
research
07/30/2019

A Robust Algorithm for Sniffing BLE Long-Lived Connections in Real-time

Bluetooth Low Energy (BLE) has become an intrinsic wireless technology f...
research
11/20/2021

VoIP Can Still Be Exploited – Badly

VoIP phones are early representatives as well as present enhancers of th...

Please sign up or login with your details

Forgot password? Click here to reset