loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Lorenzo Binosi 1 ; Pietro Mazzini 2 ; Alessandro Sanna 3 ; Michele Carminati 1 ; Giorgio Giacinto 3 ; Riccardo Lazzeretti 2 ; Stefano Zanero 1 ; Mario Polino 1 ; Emilio Coppa 4 and Davide Maiorca 3

Affiliations: 1 Politecnico of Milan, Italy ; 2 Sapienza University, Italy ; 3 University of Cagliari, Italy ; 4 LUISS University, Italy

Keyword(s): Firmware Analysis, IoT, Security Evaluation.

Abstract: Several critical contexts, such as healthcare, smart cities, drones, transportation, and agriculture, nowadays rely on IoT, or more in general embedded, devices that require comprehensive security analysis to ensure their integrity before deployment. Security concerns are often related to vulnerabilities that result from inadequate coding or undocumented features that may create significant privacy issues for users and companies. Current analysis methods, albeit dependent on complex tools, may lead to superficial assessments due to compatibility issues, while authoritative entities struggle with specifying feasible firmware analysis requests for manufacturers within operational contexts. This paper urges the scientific community to collaborate with stakeholders—manufacturers, vendors, security analysts, and experts—to forge a cooperative model that clarifies manufacturer contributions and aligns analysis demands with operational constraints. Aiming at a modular approach, this paper h ighlights the crucial need to refine security analysis, ensuring more precise requirements, balanced expectations, and stronger partnerships between vendors and analysts. To achieve this, we propose a threat model based on the feasible interactions of actors involved in the security evaluation of a device, with a particular emphasis on the responsibilities and necessities of all entities involved. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 2a06:98c0:3600::103

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Binosi, L., Mazzini, P., Sanna, A., Carminati, M., Giacinto, G., Lazzeretti, R., Zanero, S., Polino, M., Coppa, E. and Maiorca, D. (2024). Do You Trust Your Device? Open Challenges in IoT Security Analysis. In Proceedings of the 21st International Conference on Security and Cryptography - SECRYPT; ISBN 978-989-758-709-2; ISSN 2184-7711, SciTePress, pages 568-575. DOI: 10.5220/0012856200003767

@conference{secrypt24,
author={Lorenzo Binosi and Pietro Mazzini and Alessandro Sanna and Michele Carminati and Giorgio Giacinto and Riccardo Lazzeretti and Stefano Zanero and Mario Polino and Emilio Coppa and Davide Maiorca},
title={Do You Trust Your Device? Open Challenges in IoT Security Analysis},
booktitle={Proceedings of the 21st International Conference on Security and Cryptography - SECRYPT},
year={2024},
pages={568-575},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0012856200003767},
isbn={978-989-758-709-2},
issn={2184-7711},
}

TY - CONF

JO - Proceedings of the 21st International Conference on Security and Cryptography - SECRYPT
TI - Do You Trust Your Device? Open Challenges in IoT Security Analysis
SN - 978-989-758-709-2
IS - 2184-7711
AU - Binosi, L.
AU - Mazzini, P.
AU - Sanna, A.
AU - Carminati, M.
AU - Giacinto, G.
AU - Lazzeretti, R.
AU - Zanero, S.
AU - Polino, M.
AU - Coppa, E.
AU - Maiorca, D.
PY - 2024
SP - 568
EP - 575
DO - 10.5220/0012856200003767
PB - SciTePress