首页> 外文会议>IEEE AUTOTESTCON >Cyber security for automatic test equipment
【24h】

Cyber security for automatic test equipment

机译:网络安全自动测试设备

获取原文

摘要

The initial focus for the cyber security community has been to make operating systems and networks more secure and harder to penetrate. These improvements are making it more difficult to exploit these systems, driving attackers to turn their attention to embedded systems and hardware exploitation. It is expected that new threats from improperly secured embedded operating systems, poorly defended firmware applications, and weak hardware communication protocols will be the next generation of attacks that have a high probability to significantly affect the maintenance community over the next few years. In essence, attackers will be viewing test equipment as the `PC equivalent of USB devices'. By exploiting trusted relationships in hardware systems, malware can be transported through the maintenance equipment causing infection or misconfiguration of mission critical systems. These infections can spread to other parts of the weapons platform or potentially lay in wait until some predefined action occurs to expose itself and alter the intended mission or cause catastrophic damage to the weapons platform. This paper provides a survey of potential threats in DoD maintenance equipment. Where applicable, we provide best practices for identifying and mitigating these threats through the application of defense-in-depth Offensive Architecting? for hardware and embedded systems.
机译:网络安全社区的初始焦点是使操作系统和网络更安全,更难渗透。这些改进正在利用这些系统,驱动攻击者将注意力转向嵌入式系统和硬件剥削更难。预计从不正确的嵌入式操作系统,防御性固件应用程序不良和弱硬件通信协议的新威胁将是下一代攻击,这对未来几年显着影响维护社区的概率很高。从本质上讲,攻击者将将测试设备视为USB设备的PC等效物。通过利用硬件系统中的可信关系,可以通过维护设备运输恶意软件,导致关键任务系统的感染或错误配置。这些感染可以蔓延到武器平台的其他部分或潜在地搁置,直到一些预定义的行动发生,以暴露自己并改变预期的使命或对武器平台造成灾难性的损害。本文提供了对国防部维护设备的潜在威胁的调查。在适用的情况下,我们通过应用防御进攻架构来提供最佳实践,用于识别和减轻这些威胁?用于硬件和嵌入式系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号