Connected Embedded Systems- Security Vulnerabilities, Attacks and Countermeasures | HCLTech

Connected Embedded Systems- Security Vulnerabilities, Attacks and Countermeasures

This paper tries to address cyber security aspect of the connected embedded devices. The connected embedded devices are pervasive nowadays and influence the human lives around the clock. For example, we can see the uses of these connected device in healthcare, consumer electronics, industrial automation, aerospace and automotive to name some industry verticals. Some of the examples of these kind of device are health wearables, fitness bands, health implants and smart home appliances. Of course connectivity provides innumerable benefits but at the same time it makes these device open to cyber-attacks in the same manner like traditional web application have been. Cyber-attack on these devices do not result only into financial and reputational losses but may cause loss of human lives resulting in social disruption.

The infamous Sony PlayStation and Stuxnet attacks are some of the examples of the massive damage and disruption that cyber-attacks can cause.  So it is always necessary to design and develop this system in the fully secure manner. It means that we should be finding the possible threats and exploitable vulnerabilities from the design phase of the products. We should implement proper security controls and counters measure as a part of product design and implementation activities. This paper has tried to list some known common exploitable vulnerabilities, attacks and countermeasures specific to the connected devices. The listed stuff in this paper is not quite comprehensive itself but it tries to touch upon all consisting components of these kind of systems. On a broad level it tries to cover how these components can be attacked and what kind of countermeasures are available to stop those kind of attacks.

Download the Whitepaper