Security analysis and exploitation of arduino devices in the internet of things

dc.contributor.authorAlberca, Carlos
dc.contributor.authorPastrana, Sergio
dc.contributor.authorSuarez-Tangil, Guillermo
dc.contributor.authorPalmieri, Paolo
dc.contributor.funderMinisterio de Economía y Competitividaden
dc.contributor.funderConsejería de Educación, Juventud y Deporte, Comunidad de Madriden
dc.date.accessioned2017-09-22T15:44:56Z
dc.date.available2017-09-22T15:44:56Z
dc.date.issued2016-05
dc.date.updated2017-09-20T15:23:48Z
dc.description.abstractThe pervasive presence of interconnected objects enables new communication paradigms where devices can easily reach each other while interacting within their environment. The so-called Internet of Things (IoT) represents the integration of several computing and communications systems aiming at facilitating the interaction between these devices. Arduino is one of the most popular platforms used to prototype new IoT devices due to its open, flexible and easy-to-use architecture. Ardunio Yun is a dual board microcontroller that supports a Linux distribution and it is currently one of the most versatile and powerful Arduino systems. This feature positions Arduino Yun as a popular platform for developers, but it also introduces unique infection vectors from the security viewpoint. In this work, we present a security analysis of Arduino Yun. We show that Arduino Yun is vulnerable to a number of attacks and we implement a proof of concept capable of exploiting some of them.en
dc.description.sponsorshipMinisterio de Economía y Competitividad, Spain (MINECO Grant TIN2013-46469-R (SPINY: Security and Privacy in the Internet of You)); Consejería de Educación, Juventud y Deporte, Comunidad de Madrid (CAM Grant S2013/ICE- 3095 (CIBERDINE))en
dc.description.statusPeer revieweden
dc.description.versionAccepted Versionen
dc.format.mimetypeapplication/pdfen
dc.identifier.citationAlberca, C., Pastrana, S., Suarez-Tangil, G. and Palmieri, P. 'Security analysis and exploitation of arduino devices in the internet of things', Proceedings of the ACM International Conference on Computing Frontiers, Como, Italy. 2911708: ACM, 437-442. doi:10.1145/2903150.2911708en
dc.identifier.doi10.1145/2903150.2911708
dc.identifier.endpage442en
dc.identifier.isbn978-1-4503-4128-8
dc.identifier.journaltitleProceedings of the ACM International Conference on Computing Frontiers, Comen
dc.identifier.startpage437en
dc.identifier.urihttps://hdl.handle.net/10468/4778
dc.language.isoenen
dc.publisherAssociation for Computing Machinery (ACM)en
dc.relation.ispartofACM International Conference on Computing Frontiers, CF'16, Como, Italy, May 16-19, 2016, Proceedings
dc.relation.urihttps://dl.acm.org/citation.cfm?id=2911708
dc.rights© 2016 ACM. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in CF '16 Proceedings of the ACM International Conference on Computing Frontiers, http://doi.org/10.1145/2903150.2911708en
dc.subjectInternet of Things (IoT)en
dc.subjectCommunication paradigmen
dc.subjectCommunications systemsen
dc.subjectLinux distributionsen
dc.subjectPopular platformen
dc.subjectProof of concepten
dc.subjectSecurity analysisen
dc.subjectComputer operating systemsen
dc.subjectInterneten
dc.subjectSecurity systemsen
dc.titleSecurity analysis and exploitation of arduino devices in the internet of thingsen
dc.typeConference itemen
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Alberca_Pastrana_Suarez-Tangil_Palmieri_Mal-IoT_CF2016.pdf
Size:
384.55 KB
Format:
Adobe Portable Document Format
Description:
Accepted version
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.71 KB
Format:
Item-specific license agreed upon to submission
Description: