Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/4894
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPatel, Twinkle-
dc.date.accessioned2014-08-25T07:51:52Z-
dc.date.available2014-08-25T07:51:52Z-
dc.date.issued2014-06-01-
dc.identifier.urihttp://hdl.handle.net/123456789/4894-
dc.description.abstractIn electronics and computing, firmware is often used to denote the fixed, usually rather small programs that internally control various embedded devices. Upgrading firmware means upgrading the coordination among the various hardware components.We demonstrate how this feature can be exploited to allow attackers to inject malicious firmware modifications into vulnerable embedded devices. We discuss techniques for exploiting such vulnerable functionality and the implementation of a concept different malware capable of network reconnaissance, data exfiltration and propagation to general purpose computers and other embedded device types. We present a case study of different firmware modification vulnerability, which allows arbitrary injection of malware into the different firmware via various malware activity. Our work proves that the risk of this type of attacks on embedded systems is considerable, and it will further increase in the future.en_US
dc.publisherInstitute of Technologyen_US
dc.relation.ispartofseries12MCEI38;-
dc.subjectComputer 2012en_US
dc.subjectProject Report 2012en_US
dc.subjectComputer Project Reporten_US
dc.subjectProject Reporten_US
dc.subject12MCEIen_US
dc.subject12MCEI38en_US
dc.subjectINSen_US
dc.subjectINS 2012en_US
dc.subjectCE (INS)en_US
dc.titleFirmware based Malware Analysisen_US
dc.typeDissertationen_US
Appears in Collections:Dissertation, CE (INS)

Files in This Item:
File Description SizeFormat 
12MCEI38.pdf12MCEI387.05 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.