ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Performing Attacks on Radio Frequency and Embedded based Systems

Journal: International Journal of Science and Research (IJSR) (Vol.10, No. 5)

Publication Date:

Authors : ;

Page : 369-371

Keywords : Hardware hacking; Firmware; Rf attacks;

Source : Downloadexternal Find it from : Google Scholarexternal


With the increasing use of embedded devices in our daily life, security threats have also been increasing in a proportional rate. However, ensuring security in the embedded systems has become a great challenge not only for the embedded device experts but also for the manufacturers. The problem especially arises because of the limited hardware and software implementation options for the designers. At the same time, companies are trying to keep the vulnerabilities of the operating system of those embedded devices in secret and they are not relieving any necessary security updates quickly. It has become very urgent to ensure proper security of the embedded systems to save it from any major technological disaster near future. In this paper, I have broadly discussed on how to perform attack on embedded devices, So that you can be aware of embedded devices loopholes. Beside this, I have also discussed about the different causes of security threats so that you can protect the systems from the attackers.

Last modified: 2021-06-26 18:57:34