Insecurity by Design: Today’s IoT Device Security Problem
Published date: 30 Mar 2016
Maire O’Neill . Insecurity by Design: Today’s IoT Device Security Problem[J]. Engineering, 2016 , 2(1) : 48 -49 . DOI: 10.1016/J.ENG.2016.01.014
1 |
Rivera J, Van der Meulen R. Gartner says 4.9 billion connected “things” will be in use in 2015 [Internet]. 2014Nov11 [cited 2016Feb20]. Available from: http://www.gartner.com/newsroom/id/2905717.
|
2 |
Cisco. Internet of things (IoT) [Internet]. [cited 2015Jul23]. Available from: http://www.cisco.com/web/solutions/trends/iot/portfolio.html.
|
3 |
Chapman A. Hacking into internet connected light bulbs [Internet]. 2014Jul4[cited 2015Sep15]. Available from: http://contextis.com/resources/blog/hacking-internet-connected-light-bulbs.
|
4 |
Greenberg A. Hackers remotely kill a jeep on the highway−with me in it [Internet]. Wired2015Jul21 [cited 2015Sep15]. Available from: http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/.
|
5 |
Oswald D, Paar C. Breaking Mifare DESFire MF3ICD40: power analysis and templates in the real world. In: Preneel B, Takagi T, editors Cryptographic Hardware and Embedded Dystems−CHES 2011: 13th International Workshop; 2011Sep28−Oct1; Nara, Japan. Berlin: Springer; 2011. p. 207−22.
|
6 |
Eisenbarth T, Kasper T, Moradi A, Paar C, Salmasizadeh M, Shalmani MTM. On the power of power analysis in the real world: a complete break of the KeeLoq code hopping scheme. In: Wagner D, editor Advances in Cryptology−CRYPTO 2008: 28th Annual International Cryptology Conference; 2008Aug17−21; Santa Barbara, CA, USA. Berlin: Springer; 2008. p. 203−20.
|
7 |
Moradi A, Kasper M, Paar C. Black-box side-channel attacks highlight the importance of countermeasures−an analysis of the Xilinx Virtex-4 and Virtex-5 bitstream encryption mechanism. In: Dunkelman O, editor Topics in Cryptology−CT-RSA 2012: The Cryptographers’ Track at the RSA Conference 2012; 2012Feb27−Mar2; San Francisco, CA, USA. Berlin: Springer; 2012. p. 1−18.
|
8 |
National Security Agency. Suite B Cryptography today [Internet]. 2015Aug19 [cited 2015Sep15]. Available from: https://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml.
|
9 |
SAFEcrypto. About SAFEcrypto [Internet]. [cited 2015Sep15]. Available from: www.safecrypto.eu.
|
10 |
Gu C, O’Neill M. Ultra-compact and robust FPGA-based PUF identification generator. In: Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS’15); 2015May24−27; Lisbon, Portugal; 2015. p. 934−7.
|
/
〈 | 〉 |