2021
DOI: 10.1145/3471936
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection Mechanisms

Abstract: With the advances in the field of the Internet of Things (IoT) and Industrial IoT (IIoT), these devices are increasingly used in daily life or industry. To reduce costs related to the time required to develop these devices, security features are usually not considered. This situation creates a major security concern. Many solutions have been proposed to protect IoT/IIoT against various attacks, most of which are based on attacks involving physical access. However, a new class of attacks has emerged targeting h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 71 publications
0
9
0
Order By: Relevance
“…Hardware attacks such as VGAs are among the most important modern attacks on IoT/IIoT devices [ 20 ]. Features such as the predicted behavior of the device can be changed, or even secret information such as encryption keys can be changed intercepted [ 33 ].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Hardware attacks such as VGAs are among the most important modern attacks on IoT/IIoT devices [ 20 ]. Features such as the predicted behavior of the device can be changed, or even secret information such as encryption keys can be changed intercepted [ 33 ].…”
Section: Discussionmentioning
confidence: 99%
“…Software attacks targeting hardware vulnerabilities was a term used by Polychronou et al [ 20 ] to describe a specific class of malicious attack vectors targeting IoT/IIoT devices (SATHV). These techniques are aimed at both the hardware flaws in system microarchitecture and the side-channel leakages they cause in the system, and they do not require physical access to the device.…”
Section: Literature Reviewmentioning
confidence: 99%
“…They also proposed a standard hardware testing platform for IoT systems and devices to be used during the hardware design and system software development. Polychronou et al [20] reviewed the various fault injection attack vectors that do not require physical contact with the hardware components of an IoT device. The review presented novel attack methods based on the hardware vulnerabilities at the microarchitectural level in IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…The literature surveys presented in [1,19,20,25] analyzed the various hardware attack vectors to identify existing hardware vulnerabilities in components such as the microcontroller, clock generator, and voltage supply in the IoT system or device. The purpose of these surveys was to inform IoT hardware designers of the threats posed by fault injection attacks.…”
Section: Related Workmentioning
confidence: 99%
“…IoT applications have expanded world-wide, offering the users many services to engage in their personal lives to make it easier. Even though IoT applications are very powerful and give high connectivity to the users and their data over regular apps and systems, they are still considered vulnerable to a wide diversity of attacks and threats [1]. These vulnerabilities are caused by the architecture type of the IoT ecosystem that includes heterogeneous layers of communication.…”
Section: Introductionmentioning
confidence: 99%