A Rapid Review on Software Vulnerabilities and Embedded, Cyber-Physical, and IoT Systems

被引:0
|
作者
Marchetto, Alessandro [1 ]
Scanniello, Giuseppe [2 ]
机构
[1] Univ Trento, Trento, Italy
[2] Univ Salerno, Salerno, Italy
关键词
Cybersecurity; Embedded systems; Rapid Review; Software Vulnerability;
D O I
10.1007/978-3-031-49266-2_32
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents a Rapid Review (RR) conducted to identify and characterize existing approaches and methods that discover, fix, and manage vulnerabilities in Embedded, Cyber-Physical, and Internet-of-Things systems and software (ESs hereafter). In the last years, a growing interest concerned the adoption of ESs in different domains (e.g., automotive, healthcare) and with different purposes. Modern ESs are heterogeneous, computationally powerful, connected, and intelligent systems characterized by many technologies, devices, and an extensive use of embedded software (SW). Adopting software that could emulate or substitute hardware (HD) components makes the ESs flexible, tunable, and less costly but demands attention to security aspects such as SW vulnerabilities. Vulnerabilities can be exploited by attackers and compromise entire systems. The findings of our RR emerge from 61 papers and can be summarized as follows: (i) complex and connected ESs are studied especially for autonomous vehicles and robots; (ii) new methods and approaches are proposed mainly to discover software-vulnerabilities related to memory management in ES firmware software; and (iii) most of the proposed methods apply fuzzy-based dynamic analysis to binary and executable files of ES software.
引用
收藏
页码:468 / 477
页数:10
相关论文
共 50 条
  • [11] Ethics Aspects of Embedded and Cyber-Physical Systems
    Thekkilakattil, Abhilash
    Dodig-Crnkovic, Gordana
    [J]. 39TH ANNUAL IEEE COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2015), VOL 2, 2015, : 39 - 44
  • [12] Reliability of Embedded and Cyber-Physical Systems Introduction
    Chillarege, Ram
    Voas, Jeffrey
    [J]. IEEE SECURITY & PRIVACY, 2010, 8 (05) : 12 - 13
  • [13] Visualisation of Control Software for Cyber-Physical Systems
    Melatti, Igor
    Mari, Federico
    Salvo, Ivano
    Tronci, Enrico
    [J]. INFORMATION, 2021, 12 (05)
  • [14] Provable Determinism for Software in Cyber-Physical Systems
    Rossel, Marcus
    Lin, Shaokai Jerry
    Lohstroh, Marten
    Castrillon, Jeronimo
    Goens, Andres
    [J]. VERIFIED SOFTWARE: THEORIES, TOOLS AND EXPERIMENTS, VSTTE 2023, 2024, 14095 : 85 - 107
  • [15] Software Engineering Issues for Cyber-Physical Systems
    Al-Jaroodi, Jameela
    Mohamed, Nader
    Jawhar, Imad
    Lazarova-Molnar, Sanja
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2016, : 264 - 269
  • [16] Dynamic Software Updating for Cyber-Physical Systems
    Kang, Sungjoo
    Chun, Ingeol
    Kim, Wontae
    [J]. 18TH IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS (ISCE 2014), 2014,
  • [17] VULNERABILITIES OF CYBER-PHYSICAL LINEAR CONTROL SYSTEMS TO SOPHISTICATED ATTACKS
    Radisavljevic-Gajic, Verica
    Park, Seri
    Chasaki, Danai
    [J]. PROCEEDINGS OF THE ASME 10TH ANNUAL DYNAMIC SYSTEMS AND CONTROL CONFERENCE, 2017, VOL 2, 2017,
  • [18] Software Performance Antipatterns in Cyber-Physical Systems
    Smith, Connie U.
    [J]. PROCEEDINGS OF THE ACM/SPEC INTERNATIONAL CONFERENCE ON PERFORMANCE ENGINEERING (ICPE'20), 2020, : 173 - 180
  • [19] Dew Computing Architecture for Cyber-Physical Systems and IoT
    Gushev, Marjan
    [J]. INTERNET OF THINGS, 2020, 11
  • [20] Advanced Technologies for Mobile IoT and Cyber-Physical Systems
    Kang, Kyungtae
    Park, Kyung-Joon
    Wang, Qixin
    Xu, Wenyao
    [J]. MOBILE INFORMATION SYSTEMS, 2016, 2016