TY - GEN
T1 - Security analysis and exploitation of arduino devices in the internet of things
AU - Alberca, Carlos
AU - Pastrana, Sergio
AU - Suarez-Tangil, Guillermo
AU - Palmieri, Paolo
N1 - Publisher Copyright:
© 2016 Copyright held by the owner/author(s).
PY - 2016/5/16
Y1 - 2016/5/16
N2 - The pervasive presence of interconnected objects enables new communication paradigms where devices can easily reach each other while interacting within their environment. The so-called Internet of Things (IoT) represents the integration of several computing and communications systems aiming at facilitating the interaction between these devices. Arduino is one of the most popular platforms used to prototype new IoT devices due to its open, exible and easy-To-use architecture. Ardunio Yun is a dual board microcontroller that supports a Linux distribution and it is currently one of the most versatile and powerful Arduino systems. This feature positions Arduino Yun as a popular platform for developers, but it also introduces unique infection vectors from the security viewpoint. In this work, we present a security analysis of Arduino Yun. We show that Arduino Yun is vulnerable to a number of attacks and we implement a proof of concept capable of exploiting some of them.
AB - The pervasive presence of interconnected objects enables new communication paradigms where devices can easily reach each other while interacting within their environment. The so-called Internet of Things (IoT) represents the integration of several computing and communications systems aiming at facilitating the interaction between these devices. Arduino is one of the most popular platforms used to prototype new IoT devices due to its open, exible and easy-To-use architecture. Ardunio Yun is a dual board microcontroller that supports a Linux distribution and it is currently one of the most versatile and powerful Arduino systems. This feature positions Arduino Yun as a popular platform for developers, but it also introduces unique infection vectors from the security viewpoint. In this work, we present a security analysis of Arduino Yun. We show that Arduino Yun is vulnerable to a number of attacks and we implement a proof of concept capable of exploiting some of them.
UR - https://www.scopus.com/pages/publications/84978541122
U2 - 10.1145/2903150.2911708
DO - 10.1145/2903150.2911708
M3 - Conference proceeding
AN - SCOPUS:84978541122
T3 - 2016 ACM International Conference on Computing Frontiers - Proceedings
SP - 437
EP - 442
BT - 2016 ACM International Conference on Computing Frontiers - Proceedings
PB - Association for Computing Machinery, Inc
T2 - ACM International Conference on Computing Frontiers, CF 2016
Y2 - 16 May 2016 through 18 May 2016
ER -