SlideShare a Scribd company logo
SECURITY IN AN EMBEDDED
SYSTEM
Submitted By:
URMILA S
ELECTRONICS AND COMMUNICATION
SJCE MYSURU
WHAT IS SECURITY IN AN EMBEDDED SYSTEM
• Embedded System Security Is a Strategic approach to protecting software
running on Embedded Systems from attack. An Embedded System is a
programmable hardware component with a minimal operating system and
software.
• Embedded Systems are designed to perform a dedicated function or functions.
Found in Consumer Electronics, Process Control Systems, Aircraft, In-car
systems and many other applications, Embedded systems need to be extremely
reliable. Because of their small size and limited compute resources, However,
They can present security challenges for designers and developers.
WHY DO WE REQUIRE SECURITY IN AN
EMBEDDED SYSTEM
 The most common examples of embedded system exploits are Hacks Of Consumer Electronics such as GPS Devices,
Video Cards, Wi-Fi Routers, and Gaming devices. These hacks are usually possible because manufacturers don’t protect
their firmware. As a result, Almost anyone with a little technical knowledge can gain access to premium features or
Overclock A device. It was originally published On Https://Www.Apriorit.Com/.
 In 2018, Ethical hackers found Meltdown And Spectre Hardware Vulnerabilities that affect all Intel X86 and Some AMD
Processors. Both Vulnerabilities mess up isolation between user Applications, Giving applications access to sensitive data
and expanding the attack surface. Both Linux and Windows developers have issued patches for their operating systems that
partially protect devices from Meltdown and Spectre. However, Lots of devices (Especially Old Ones) Running on
Vulnerable Processors are still unprotected. It was originally published On Https://Www.Apriorit.Com/.
 Military Equipment also can suffer From attacks on embedded systems. For example, Hackers could Shut Down the
trusted aircraft information download station on the F-15 Fighter Jet. This Embedded device collects data from video
cameras and sensors during the flight, Giving Pilots navigation Data. It was originally published on
Https://Www.Apriorit.Com/.
ATTACK TAXONOMY IN AN EMBEDDED SYSTEM
Five Dimensions Are Defined Along Which Attack Against Embedded
Systems Can Be Classified
1. Preconditions
2. Vulnerability
3. Target
4. Attack Method
5. Effect Of The Attack
1. PRECONDITION
• Internet Facing Device.
• Local Or Remote Access Device.
• Direct Physical Access To The Device.
• Physically Proximity Of The Attacker.
2. VULNERABILITIES
• Programming Errors.
• Web Based Vulnerability.
• Weak Access Control Or Authentication.
• Improper Use Of Cryptography.
3. TARGET
• Hardware
• Firmware/Os
• Application
• Device Itself
4. ATTACK METHOD
• Control Hijacking Attacks.
• Reverse Engineering.
• Malware.
• Injection Crafted Packets Or Code Injection.
• Eavesdropping.
• Brute-force Search Attacks.
5. EFFECT OFATTACK
• Denial - Of - Service.
• Code Execution.
• Integrity Evolution.
• Information Leakage.
• Illegitimate Access.
• Financial Loses.
CONCLUSION
• Security Is An Important Requirement In Emerging Embedded
Systems, Especially Considering The Connectivity That Most Of
These Systems Provide To System Networks, Private Networks, Or
The Internet.
• Here Security In Embedded Systems Are Highlighted
• From These Implementations Makes The Management Of Embedded
Devices Easy And Efficient.
• It Is Suitable For Existing Embedded Devices.
REFERENCES
[1] J.Lizarraga, Urko Zurutuza, Roberto Uribeetxeberria, Miguel
Fernandez Arrieta “Security In Embedded Systems ” 2006.
[2] Dorottya Papp, Zhendong Ma, Levente Buttyan “Embedded
Systems Security: Threats, Vulnerabilities, And Attack
Taxonomy” 2015.
[3] Wei Liu, Haihang Niu, Weifeng Luo, Wei Deng, Haitao Wu,
Shanglin Dai, Zhongwei Qiao, Wei Feng “Research On
Technology Of Embedded System Security Protection
Component” 2020.
[4] Dr. Afsaneh Minaie, Mr. Jacob Haven Gosling, Dr. Reza Sanati-
mehrizy, Utah Valley University “Availability And Structure Of
Security In Embedded Systems” 2017.
THANK YOU

More Related Content

What's hot

Introduction to Embedded Architecture
Introduction to Embedded Architecture Introduction to Embedded Architecture
Introduction to Embedded Architecture
amrutachintawar239
 
AUTOMOTIVE CYBER SECURITY PPT
AUTOMOTIVE CYBER SECURITY PPTAUTOMOTIVE CYBER SECURITY PPT
AUTOMOTIVE CYBER SECURITY PPT
VinayakSharma609332
 
Password based door lock system using 8051 microcontroller final report
Password based door lock system using 8051 microcontroller final reportPassword based door lock system using 8051 microcontroller final report
Password based door lock system using 8051 microcontroller final report
Chinaraja Baratam
 
Introduction to arduino ppt main
Introduction to  arduino ppt mainIntroduction to  arduino ppt main
Introduction to arduino ppt main
eddy royappa
 
Shiv smart door ppt
Shiv smart door pptShiv smart door ppt
Shiv smart door ppt
Mahesh Patil
 
Smart Door locking system using arduino
Smart Door locking system using arduinoSmart Door locking system using arduino
Smart Door locking system using arduino
BhawnaSingh351973
 
2. block diagram and components of embedded system
2. block diagram and components of embedded system2. block diagram and components of embedded system
2. block diagram and components of embedded system
Vikas Dongre
 
Introduction to Embedded Systems I : Chapter 1
Introduction to Embedded Systems I : Chapter 1Introduction to Embedded Systems I : Chapter 1
Introduction to Embedded Systems I : Chapter 1
Moe Moe Myint
 
1. Introduction to Embedded Systems & IoT
1. Introduction to Embedded Systems & IoT1. Introduction to Embedded Systems & IoT
1. Introduction to Embedded Systems & IoT
IEEE MIU SB
 
Embedded system
Embedded systemEmbedded system
Embedded system
Anmol Bagga
 
Embedded system
Embedded systemEmbedded system
Embedded system
Vinod Srivastava
 
finger door lock.ppt g.m.r.pptx
finger door lock.ppt g.m.r.pptxfinger door lock.ppt g.m.r.pptx
finger door lock.ppt g.m.r.pptx
KSanthosh14
 
Introduction to embedded systems
Introduction to embedded systemsIntroduction to embedded systems
Introduction to embedded systems
Apurva Zope
 
Embedded System
Embedded System Embedded System
Embedded System
Sonali Parab
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Simplilearn
 
Ppt on embedded systems
Ppt on embedded systemsPpt on embedded systems
Ppt on embedded systems
Vaibhava Mishra
 
Embedded system introduction
Embedded system introductionEmbedded system introduction
Embedded system introduction
RajalakshmiSermadurai
 
project report on embedded system
project report on embedded systemproject report on embedded system
project report on embedded system
ram avtar
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and Solutions
Ulf Mattsson
 
Chapter 3 Charateristics and Quality Attributes of Embedded System
Chapter 3 Charateristics and Quality Attributes of Embedded SystemChapter 3 Charateristics and Quality Attributes of Embedded System
Chapter 3 Charateristics and Quality Attributes of Embedded System
Moe Moe Myint
 

What's hot (20)

Introduction to Embedded Architecture
Introduction to Embedded Architecture Introduction to Embedded Architecture
Introduction to Embedded Architecture
 
AUTOMOTIVE CYBER SECURITY PPT
AUTOMOTIVE CYBER SECURITY PPTAUTOMOTIVE CYBER SECURITY PPT
AUTOMOTIVE CYBER SECURITY PPT
 
Password based door lock system using 8051 microcontroller final report
Password based door lock system using 8051 microcontroller final reportPassword based door lock system using 8051 microcontroller final report
Password based door lock system using 8051 microcontroller final report
 
Introduction to arduino ppt main
Introduction to  arduino ppt mainIntroduction to  arduino ppt main
Introduction to arduino ppt main
 
Shiv smart door ppt
Shiv smart door pptShiv smart door ppt
Shiv smart door ppt
 
Smart Door locking system using arduino
Smart Door locking system using arduinoSmart Door locking system using arduino
Smart Door locking system using arduino
 
2. block diagram and components of embedded system
2. block diagram and components of embedded system2. block diagram and components of embedded system
2. block diagram and components of embedded system
 
Introduction to Embedded Systems I : Chapter 1
Introduction to Embedded Systems I : Chapter 1Introduction to Embedded Systems I : Chapter 1
Introduction to Embedded Systems I : Chapter 1
 
1. Introduction to Embedded Systems & IoT
1. Introduction to Embedded Systems & IoT1. Introduction to Embedded Systems & IoT
1. Introduction to Embedded Systems & IoT
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
finger door lock.ppt g.m.r.pptx
finger door lock.ppt g.m.r.pptxfinger door lock.ppt g.m.r.pptx
finger door lock.ppt g.m.r.pptx
 
Introduction to embedded systems
Introduction to embedded systemsIntroduction to embedded systems
Introduction to embedded systems
 
Embedded System
Embedded System Embedded System
Embedded System
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
 
Ppt on embedded systems
Ppt on embedded systemsPpt on embedded systems
Ppt on embedded systems
 
Embedded system introduction
Embedded system introductionEmbedded system introduction
Embedded system introduction
 
project report on embedded system
project report on embedded systemproject report on embedded system
project report on embedded system
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and Solutions
 
Chapter 3 Charateristics and Quality Attributes of Embedded System
Chapter 3 Charateristics and Quality Attributes of Embedded SystemChapter 3 Charateristics and Quality Attributes of Embedded System
Chapter 3 Charateristics and Quality Attributes of Embedded System
 

Similar to Security in an embedded system

DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
iQHub
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
iQHub
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile security
Satya Harish
 
The Future Mobile Security
The Future Mobile Security The Future Mobile Security
The Future Mobile Security
Qualcomm Developer Network
 
IoT-Device-Security.pptx
IoT-Device-Security.pptxIoT-Device-Security.pptx
IoT-Device-Security.pptx
ZahidHussainqaisar
 
IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentation
AuliaArifWardana
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
Security Innovation
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
HCL Technologies
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
Gurjit
 
Cloud security
Cloud securityCloud security
AXENT-Everything-IDS
AXENT-Everything-IDSAXENT-Everything-IDS
AXENT-Everything-IDS
Condition Zebra (CONZebra)
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
amiyadutta
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
Satya P. Joshi
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
Online
 
Web Server Security Guidelines
Web Server Security GuidelinesWeb Server Security Guidelines
Web Server Security Guidelines
webhostingguy
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
MEN Mikro Elektronik GmbH
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
MEN Micro
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
Uditha Bandara Wijerathna
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
Intel IT Center
 

Similar to Security in an embedded system (20)

DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile security
 
The Future Mobile Security
The Future Mobile Security The Future Mobile Security
The Future Mobile Security
 
IoT-Device-Security.pptx
IoT-Device-Security.pptxIoT-Device-Security.pptx
IoT-Device-Security.pptx
 
IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentation
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Cloud security
Cloud securityCloud security
Cloud security
 
AXENT-Everything-IDS
AXENT-Everything-IDSAXENT-Everything-IDS
AXENT-Everything-IDS
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Web Server Security Guidelines
Web Server Security GuidelinesWeb Server Security Guidelines
Web Server Security Guidelines
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 

Recently uploaded

132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
Prakhyath Rai
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
bijceesjournal
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
edwin408357
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 

Recently uploaded (20)

132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 

Security in an embedded system

  • 1. SECURITY IN AN EMBEDDED SYSTEM Submitted By: URMILA S ELECTRONICS AND COMMUNICATION SJCE MYSURU
  • 2. WHAT IS SECURITY IN AN EMBEDDED SYSTEM • Embedded System Security Is a Strategic approach to protecting software running on Embedded Systems from attack. An Embedded System is a programmable hardware component with a minimal operating system and software. • Embedded Systems are designed to perform a dedicated function or functions. Found in Consumer Electronics, Process Control Systems, Aircraft, In-car systems and many other applications, Embedded systems need to be extremely reliable. Because of their small size and limited compute resources, However, They can present security challenges for designers and developers.
  • 3. WHY DO WE REQUIRE SECURITY IN AN EMBEDDED SYSTEM  The most common examples of embedded system exploits are Hacks Of Consumer Electronics such as GPS Devices, Video Cards, Wi-Fi Routers, and Gaming devices. These hacks are usually possible because manufacturers don’t protect their firmware. As a result, Almost anyone with a little technical knowledge can gain access to premium features or Overclock A device. It was originally published On Https://Www.Apriorit.Com/.  In 2018, Ethical hackers found Meltdown And Spectre Hardware Vulnerabilities that affect all Intel X86 and Some AMD Processors. Both Vulnerabilities mess up isolation between user Applications, Giving applications access to sensitive data and expanding the attack surface. Both Linux and Windows developers have issued patches for their operating systems that partially protect devices from Meltdown and Spectre. However, Lots of devices (Especially Old Ones) Running on Vulnerable Processors are still unprotected. It was originally published On Https://Www.Apriorit.Com/.  Military Equipment also can suffer From attacks on embedded systems. For example, Hackers could Shut Down the trusted aircraft information download station on the F-15 Fighter Jet. This Embedded device collects data from video cameras and sensors during the flight, Giving Pilots navigation Data. It was originally published on Https://Www.Apriorit.Com/.
  • 4. ATTACK TAXONOMY IN AN EMBEDDED SYSTEM Five Dimensions Are Defined Along Which Attack Against Embedded Systems Can Be Classified 1. Preconditions 2. Vulnerability 3. Target 4. Attack Method 5. Effect Of The Attack
  • 5. 1. PRECONDITION • Internet Facing Device. • Local Or Remote Access Device. • Direct Physical Access To The Device. • Physically Proximity Of The Attacker.
  • 6. 2. VULNERABILITIES • Programming Errors. • Web Based Vulnerability. • Weak Access Control Or Authentication. • Improper Use Of Cryptography.
  • 7. 3. TARGET • Hardware • Firmware/Os • Application • Device Itself
  • 8. 4. ATTACK METHOD • Control Hijacking Attacks. • Reverse Engineering. • Malware. • Injection Crafted Packets Or Code Injection. • Eavesdropping. • Brute-force Search Attacks.
  • 9. 5. EFFECT OFATTACK • Denial - Of - Service. • Code Execution. • Integrity Evolution. • Information Leakage. • Illegitimate Access. • Financial Loses.
  • 10. CONCLUSION • Security Is An Important Requirement In Emerging Embedded Systems, Especially Considering The Connectivity That Most Of These Systems Provide To System Networks, Private Networks, Or The Internet. • Here Security In Embedded Systems Are Highlighted • From These Implementations Makes The Management Of Embedded Devices Easy And Efficient. • It Is Suitable For Existing Embedded Devices.
  • 11. REFERENCES [1] J.Lizarraga, Urko Zurutuza, Roberto Uribeetxeberria, Miguel Fernandez Arrieta “Security In Embedded Systems ” 2006. [2] Dorottya Papp, Zhendong Ma, Levente Buttyan “Embedded Systems Security: Threats, Vulnerabilities, And Attack Taxonomy” 2015. [3] Wei Liu, Haihang Niu, Weifeng Luo, Wei Deng, Haitao Wu, Shanglin Dai, Zhongwei Qiao, Wei Feng “Research On Technology Of Embedded System Security Protection Component” 2020. [4] Dr. Afsaneh Minaie, Mr. Jacob Haven Gosling, Dr. Reza Sanati- mehrizy, Utah Valley University “Availability And Structure Of Security In Embedded Systems” 2017.