Security analysis and exploitation of arduino devices in the internet of things

  • Carlos Alberca
  • , Sergio Pastrana
  • , Guillermo Suarez-Tangil
  • , Paolo Palmieri

Research output: Chapter in Book/Report/Conference proceedingsConference proceedingpeer-review

Abstract

The pervasive presence of interconnected objects enables new communication paradigms where devices can easily reach each other while interacting within their environment. The so-called Internet of Things (IoT) represents the integration of several computing and communications systems aiming at facilitating the interaction between these devices. Arduino is one of the most popular platforms used to prototype new IoT devices due to its open, exible and easy-To-use architecture. Ardunio Yun is a dual board microcontroller that supports a Linux distribution and it is currently one of the most versatile and powerful Arduino systems. This feature positions Arduino Yun as a popular platform for developers, but it also introduces unique infection vectors from the security viewpoint. In this work, we present a security analysis of Arduino Yun. We show that Arduino Yun is vulnerable to a number of attacks and we implement a proof of concept capable of exploiting some of them.

Original languageEnglish
Title of host publication2016 ACM International Conference on Computing Frontiers - Proceedings
PublisherAssociation for Computing Machinery, Inc
Pages437-442
Number of pages6
ISBN (Electronic)9781450341288
DOIs
Publication statusPublished - 16 May 2016
Externally publishedYes
EventACM International Conference on Computing Frontiers, CF 2016 - Como, Italy
Duration: 16 May 201618 May 2016

Publication series

Name2016 ACM International Conference on Computing Frontiers - Proceedings

Conference

ConferenceACM International Conference on Computing Frontiers, CF 2016
Country/TerritoryItaly
CityComo
Period16/05/1618/05/16

Fingerprint

Dive into the research topics of 'Security analysis and exploitation of arduino devices in the internet of things'. Together they form a unique fingerprint.

Cite this