首页> 外文会议>Embedded Systems Conference >Hacks and Attacks: Examples of Electronic Device Compromise Embedded Systems Conference Silicon Valley 2010 (ESC-343)
【24h】

Hacks and Attacks: Examples of Electronic Device Compromise Embedded Systems Conference Silicon Valley 2010 (ESC-343)

机译:黑客和攻击:电子设备的示例妥协嵌入式系统会议硅谷2010(ESC-343)

获取原文

摘要

Bolstered by the flourishing hobbyist electronics and do-it-yourself movements, easy access to equipment, and nearly realtime information sharing courtesy of the Internet, hardware devices have become a target for both harmless, curious hackers and malicious attackers. Many devices are inherently trusted and taken for granted, though they are actually susceptible to compromise leading to potential financial, social, or legal implications. As engineers, we have a responsibility to learn from problems of the past and anticipate new ones in order to better equip ourselves for designs of the future. This paper will present a typical hardware hacking process and explore a few real-world attacks against electronic devices.
机译:蓬勃发展的爱好者电子产品和自己动手动作,方便地访问设备,以及几乎实时信息共享互联网的礼貌,硬件设备已成为无害,好奇的黑客和恶意攻击者的目标。许多设备本质上是信任和理所当然的,尽管它们实际上易于妥协,导致潜在的财务,社会或法律影响。作为工程师,我们有责任从过去的问题中学习,并预测新的问题,以便更好地装备自己的未来设计。本文将展示典型的硬件黑客过程,并探索对电子设备的一些真实攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号