{"title":"最近针对特定嵌入式系统的攻击评估","authors":"Shoaib Ehsan, K. Mcdonald-Maier","doi":"10.1109/EST.2014.11","DOIUrl":null,"url":null,"abstract":"In this paper, we present an assessment of recent attacks on embedded systems, in particular mobile phones, wireless sensor networks, unmanned aerial vehicles and unmanned ground vehicles. As these systems become increasingly connected and networked, the number of attacks on them increases exposing them to real threats and risks, particularly when used in mission critical applications. It is necessary to investigate all aspects of the security systems associated with embedded systems in order to help protect these systems from attackers. In this we present a survey on a number of embedded systems to show system vulnerabilities, recent attacks and the security measurements undertaken to protect the embedded systems.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"110 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"An Assessment of Recent Attacks on Specific Embedded Systems\",\"authors\":\"Shoaib Ehsan, K. Mcdonald-Maier\",\"doi\":\"10.1109/EST.2014.11\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we present an assessment of recent attacks on embedded systems, in particular mobile phones, wireless sensor networks, unmanned aerial vehicles and unmanned ground vehicles. As these systems become increasingly connected and networked, the number of attacks on them increases exposing them to real threats and risks, particularly when used in mission critical applications. It is necessary to investigate all aspects of the security systems associated with embedded systems in order to help protect these systems from attackers. In this we present a survey on a number of embedded systems to show system vulnerabilities, recent attacks and the security measurements undertaken to protect the embedded systems.\",\"PeriodicalId\":193536,\"journal\":{\"name\":\"2014 Fifth International Conference on Emerging Security Technologies\",\"volume\":\"110 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Fifth International Conference on Emerging Security Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EST.2014.11\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Fifth International Conference on Emerging Security Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EST.2014.11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Assessment of Recent Attacks on Specific Embedded Systems
In this paper, we present an assessment of recent attacks on embedded systems, in particular mobile phones, wireless sensor networks, unmanned aerial vehicles and unmanned ground vehicles. As these systems become increasingly connected and networked, the number of attacks on them increases exposing them to real threats and risks, particularly when used in mission critical applications. It is necessary to investigate all aspects of the security systems associated with embedded systems in order to help protect these systems from attackers. In this we present a survey on a number of embedded systems to show system vulnerabilities, recent attacks and the security measurements undertaken to protect the embedded systems.