Abstract
Cybercriminals can break into any connected system. Traditionally, IT systems with their many open interfaces had been in the focus of attackers, while embedded systems were perceived to be too difficult to hack and not worth the time and energy required. But as systems have added Ethernet, WLAN, USB, Bluetooth, GPS, and other connectivity features, the number of attack surfaces has increased. The most popular hacking method involves attacking a diagnosis port, or otherwise open interface, which can give a malevolent party access to functions or, at least, the ability to corrupt data and prohibit performance such as denial-of-service attacks.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.