Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/4894
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Patel, Twinkle | - |
dc.date.accessioned | 2014-08-25T07:51:52Z | - |
dc.date.available | 2014-08-25T07:51:52Z | - |
dc.date.issued | 2014-06-01 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/4894 | - |
dc.description.abstract | In electronics and computing, firmware is often used to denote the fixed, usually rather small programs that internally control various embedded devices. Upgrading firmware means upgrading the coordination among the various hardware components.We demonstrate how this feature can be exploited to allow attackers to inject malicious firmware modifications into vulnerable embedded devices. We discuss techniques for exploiting such vulnerable functionality and the implementation of a concept different malware capable of network reconnaissance, data exfiltration and propagation to general purpose computers and other embedded device types. We present a case study of different firmware modification vulnerability, which allows arbitrary injection of malware into the different firmware via various malware activity. Our work proves that the risk of this type of attacks on embedded systems is considerable, and it will further increase in the future. | en_US |
dc.publisher | Institute of Technology | en_US |
dc.relation.ispartofseries | 12MCEI38; | - |
dc.subject | Computer 2012 | en_US |
dc.subject | Project Report 2012 | en_US |
dc.subject | Computer Project Report | en_US |
dc.subject | Project Report | en_US |
dc.subject | 12MCEI | en_US |
dc.subject | 12MCEI38 | en_US |
dc.subject | INS | en_US |
dc.subject | INS 2012 | en_US |
dc.subject | CE (INS) | en_US |
dc.title | Firmware based Malware Analysis | en_US |
dc.type | Dissertation | en_US |
Appears in Collections: | Dissertation, CE (INS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
12MCEI38.pdf | 12MCEI38 | 7.05 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.