A Rapid Review on Software Vulnerabilities and Embedded, Cyber-Physical, and IoT Systems

被引:0
|
作者
Marchetto, Alessandro [1 ]
Scanniello, Giuseppe [2 ]
机构
[1] Univ Trento, Trento, Italy
[2] Univ Salerno, Salerno, Italy
关键词
Cybersecurity; Embedded systems; Rapid Review; Software Vulnerability;
D O I
10.1007/978-3-031-49266-2_32
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents a Rapid Review (RR) conducted to identify and characterize existing approaches and methods that discover, fix, and manage vulnerabilities in Embedded, Cyber-Physical, and Internet-of-Things systems and software (ESs hereafter). In the last years, a growing interest concerned the adoption of ESs in different domains (e.g., automotive, healthcare) and with different purposes. Modern ESs are heterogeneous, computationally powerful, connected, and intelligent systems characterized by many technologies, devices, and an extensive use of embedded software (SW). Adopting software that could emulate or substitute hardware (HD) components makes the ESs flexible, tunable, and less costly but demands attention to security aspects such as SW vulnerabilities. Vulnerabilities can be exploited by attackers and compromise entire systems. The findings of our RR emerge from 61 papers and can be summarized as follows: (i) complex and connected ESs are studied especially for autonomous vehicles and robots; (ii) new methods and approaches are proposed mainly to discover software-vulnerabilities related to memory management in ES firmware software; and (iii) most of the proposed methods apply fuzzy-based dynamic analysis to binary and executable files of ES software.
引用
收藏
页码:468 / 477
页数:10
相关论文
共 50 条
  • [31] Live forensics of software attacks on cyber-physical systems
    Al-Sharif, Ziad A.
    Al-Saleh, Mohammed, I
    Alawneh, Luay M.
    Jararweh, Yaser, I
    Gupta, Brij
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 : 1217 - 1229
  • [32] Optimally Scheduled Interventions in the Presence of Vulnerabilities for Modern Cyber-Physical Systems
    Sandor, Hunor
    Haller, Piroska
    Genge, Bela
    Katai, Zoltan
    [J]. 2017 IEEE 15TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2017, : 115 - 120
  • [33] Software Abstractions and Architectures for Smart Cyber-Physical Systems
    Hnetynka, Petr
    [J]. 2017 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), 2017, : 3 - 3
  • [34] Cyber-physical Threats and Vulnerabilities Analysis for Train Control and Monitoring Systems
    Rekik, Mouna
    Gransart, Christophe
    Berbineau, Marion
    [J]. 2018 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2018), 2018,
  • [35] Formal Analysis of Control Software for Cyber-Physical Systems
    Herrmann, Peter
    Blech, Jan Olaf
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2017, : 563 - 564
  • [36] A zonotopic characterization of cyber-physical system vulnerabilities
    Li, Jitao
    Wang, Zhenhua
    Shen, Yi
    Xie, Lihua
    [J]. INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2022, 32 (09) : 5379 - 5397
  • [37] Cyber-Physical Networks and Software
    Xia, Feng
    Ivanovic, Mirjana
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2011, 8 (04)
  • [38] Cyber-physical Systems and Industrial IoT Cybersecurity: Issues and Solutions
    Shim, J. P.
    [J]. 25TH AMERICAS CONFERENCE ON INFORMATION SYSTEMS (AMCIS 2019), 2019,
  • [39] Detecting Spies in IoT Systems using Cyber-Physical Correlation
    Lagesse, Brent
    Wu, Kevin
    Shorb, Jaynie
    Zhu, Zealous
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2018,
  • [40] IPv6 Convergence for IoT Cyber-Physical Systems
    Nolan, Keith
    Kelly, Mark
    [J]. INFORMATION, 2018, 9 (04)