A large number of embedded devices on the internet, such as routers and VOIP phones, are typically ripe for exploitation. Little to no defensive technology, such as AV scanners or IDS's, are available to protect these devices. We propose a host-based defense mechanism, which we call Symbiotic Embedded Machines (SEM), that is specifically designed to inject intrusion detection functionality into the firmware of the device. A SEM or simply the Symbiote, may be injected into deployed legacy embedded systems with no disruption to the operation of the device. A Symbiote is a code structure embedded in situ into the firmware of an embedded system. The Symbiote can tightly co-exist with arbitrary host executables in a mutually defensive arrangemen...
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a v...
Embedded systems are ubiquitously used today. From everyday electronic consumer products to critical...
The emergence of hardware virtualization technology has led to the development of OS independent mal...
Our global communication infrastructures are powered by large numbers of legacy embedded devices. Re...
We present a body of work aimed at understanding and improving the security posture of embedded devi...
Embedded devices are currently used in many critical systems, ranging from automotive to medical dev...
IoT systems are subject to cyber attacks, including infecting embedded IoT devices with rootkits. Ro...
Embedded devices are ubiquitous; they are present in various sectors of everyday life: smart homes, ...
The Internet of Things (IoT) has grown dramatically over the past years. Largely autonomous, lightwe...
The security of low-end embedded systems became a very important topic as they are more connected an...
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale....
As software security expert Bruce Schneier argues, the pervasive vulnerability of embedded systems t...
Embedded systems are widely used in critical situations and hence, are targets for malicious users....
Networks of embedded devices are becoming increasingly popular. Examples of such networks range from...
Internet of things (IoT) devices are appearing in all aspects of our digital life. As such, they hav...
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a v...
Embedded systems are ubiquitously used today. From everyday electronic consumer products to critical...
The emergence of hardware virtualization technology has led to the development of OS independent mal...
Our global communication infrastructures are powered by large numbers of legacy embedded devices. Re...
We present a body of work aimed at understanding and improving the security posture of embedded devi...
Embedded devices are currently used in many critical systems, ranging from automotive to medical dev...
IoT systems are subject to cyber attacks, including infecting embedded IoT devices with rootkits. Ro...
Embedded devices are ubiquitous; they are present in various sectors of everyday life: smart homes, ...
The Internet of Things (IoT) has grown dramatically over the past years. Largely autonomous, lightwe...
The security of low-end embedded systems became a very important topic as they are more connected an...
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale....
As software security expert Bruce Schneier argues, the pervasive vulnerability of embedded systems t...
Embedded systems are widely used in critical situations and hence, are targets for malicious users....
Networks of embedded devices are becoming increasingly popular. Examples of such networks range from...
Internet of things (IoT) devices are appearing in all aspects of our digital life. As such, they hav...
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a v...
Embedded systems are ubiquitously used today. From everyday electronic consumer products to critical...
The emergence of hardware virtualization technology has led to the development of OS independent mal...