원문정보
초록
영어
Recently, more users have been using IoT embedded systems. Since the wireless network function is a basic and core function in most embedded systems, new security threats and weaknesses are expected to occur. In order to resolve these threats, it is necessary to investigate the security issues in the development stages according to the Security Development Lifecycle (SDL). This study analyzes the vulnerabilities of the embedded systems equipped with the wireless network function, and derives possible security threats and how dangerous such threats are. We present security risks including bypassing the authentication stage required for accessing to the embedded system.
목차
1. Introduction
2. Security Vulnerabilities and Risk
2.1 Environment Settings for Analyzation
2.2 Structural & Systematic Vulnerabilities
2.3 Examples of Structural Vulnerabilities
2.4 Example of Systematic Vulnerabilities
3. Conclusion
Acknowledgements
Reference