Embedded systems security: Threats, vulnerabilities, and attack taxonomy

Author(s):  
Dorottya Papp ◽  
Zhendong Ma ◽  
Levente Buttyan
Author(s):  
Steffi Haag ◽  
Mikko Siponen ◽  
Fufan Liu

Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars.


2021 ◽  
Vol 158 (A3) ◽  
Author(s):  
A John ◽  
T C Nwaoha

Safety Critical Maritime Infrastructure (SCMI) systems are vulnerable to diverse risks in their challenging field of operations due to their interactions and interdependence. In addition, the multiplicity of stakeholders in these systems and the complex operational scenarios are often associated with a high level of uncertainty because they usually operate in a dynamic environment in which the boundaries of safety are pushed, leading to the disruption of operations. Therefore, the safety of these systems is very important to ensuring resilience of their operations. This research is focus on the background analysis of SCMI systems. This includes operational processes of SCMI systems, security threats and estimates of economic damage to the system, resilience engineering literature relevant to maritime operations; regulatory overview including risk governance of the systems, lessons learnt from major accidents and a concluding remark is drawn.


Author(s):  
ARIEL LUTENBERG ◽  
BRUNO C ◽  
FABIAN VARGAS ◽  
FEDERICO ZACCHIGNA ◽  
LETICIA BOLZANI ◽  
...  

Author(s):  
Muhammad Farooq-i-Azam ◽  
Muhammad Naeem Ayyaz

Not long ago, it was thought that only software applications and general purpose digital systems i.e. computers were prone to various types of attacks against their security. The underlying hardware, hardware implementations of these software applications, embedded systems, and hardware devices were considered to be secure and out of reach of these attacks. However, during the previous few years, it has been demonstrated that novel attacks against the hardware and embedded systems can also be mounted. Not only viruses, but worms and Trojan horses have been developed for them, and they have also been demonstrated to be effective. Whereas a lot of research has already been done in the area of security of general purpose computers and software applications, hardware and embedded systems security is a relatively new and emerging area of research. This chapter provides details of various types of existing attacks against hardware devices and embedded systems, analyzes existing design methodologies for their vulnerability to new types of attacks, and along the way describes solutions and countermeasures against them for the design and development of secure systems.


Author(s):  
David Kleidermacher ◽  
Mike Kleidermacher

2007 ◽  
Vol 4 (2) ◽  
pp. 1-4 ◽  
Author(s):  
Matthew Eby ◽  
Jan Werner ◽  
Gabor Karsai ◽  
Akos Ledeczi

Sign in / Sign up

Export Citation Format

Share Document