Alberca, C., Pastrana, S., Suarez-Tangil, G. and Palmieri, P., 2016. Security analysis and exploitation of arduino devices in the internet of things. In: Malicious Software and Hardware in Internet of Things (Mal-IoT) - co-located with ACM Computing Frontiers (CF 2016), 16-19 May 2016, Como, Italy, 437 - 442.
Full text available as:
|
PDF (© ACM, 2016. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution)
Alberca_Pastrana_Suarez-Tangil_Palmieri_Mal-IoT_CF2016. accepted version.pdf - Accepted Version Available under License Creative Commons Attribution Non-commercial No Derivatives. 393kB | |
Copyright to original material in this document is with the original owner(s). Access to this content through BURO is granted on condition that you use it only for research, scholarly or other non-commercial purposes. If you wish to use it for any other purposes, you must contact BU via BURO@bournemouth.ac.uk. Any third party copyright material in this document remains the property of its respective owner(s). BU grants no licence for further use of that third party material. |
Abstract
The pervasive presence of interconnected objects enables new communication paradigms where devices can easily reach each other while interacting within their environment. The so-called Internet of Things (IoT) represents the integration of several computing and communications systems aiming at facilitating the interaction between these devices. Arduino is one of the most popular platforms used to prototype new IoT devices due to its open, flexible and easy-to-use architecture. Ardunio Yun is a dual board microcontroller that supports a Linux distribution and it is currently one of the most versatile and powerful Arduino systems. This feature positions Arduino Yun as a popular platform for developers, but it also introduces unique infection vectors from the security viewpoint. In this work, we present a security analysis of Arduino Yun. We show that Arduino Yun is vulnerable to a number of attacks and we implement a proof of concept capable of exploiting some of them.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
Additional Information: | © ACM, 2016. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in CF '16 Proceedings of the ACM International Conference on Computing Frontiers Pages 437-442. Funding Sources: Consejería de Educación, Cultura y Deporte de la Comunidad de Madrid, Spain Ministerio de Economía y Competitividad (MINECO), Spain |
Group: | Faculty of Science & Technology |
ID Code: | 23799 |
Deposited By: | Symplectic RT2 |
Deposited On: | 13 Jun 2016 13:48 |
Last Modified: | 14 Mar 2022 13:56 |
Downloads
Downloads per month over past year
Repository Staff Only - |