Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Alberca, Carlos; Pastrana, Sergio; Suarez-Tangil, Guillermo; Palmieri, Paolo (2016)
Publisher: Association for Computing Machinery (ACM)
Languages: English
Types: Conference object
Subjects: Linux distributions, Security analysis, Communications systems, Internet of Things (IoT), Computer operating systems, Communication paradigm, Security systems, Proof of concept, Popular platform, Internet

Classified by OpenAIRE into

The pervasive presence of interconnected objects enables new communication paradigms where devices can easily reach each other while interacting within their environment. The so-called Internet of Things (IoT) represents the integration of several computing and communications systems aiming at facilitating the interaction between these devices. Arduino is one of the most popular platforms used to prototype new IoT devices due to its open, flexible and easy-to-use architecture. Ardunio Yun is a dual board microcontroller that supports a Linux distribution and it is currently one of the most versatile and powerful Arduino systems. This feature positions Arduino Yun as a popular platform for developers, but it also introduces unique infection vectors from the security viewpoint. In this work, we present a security analysis of Arduino Yun. We show that Arduino Yun is vulnerable to a number of attacks and we implement a proof of concept capable of exploiting some of them.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] M. Banzi, D. Cuartielles, T. Igoe, G. Martino, and D. Mellis. Arduino o cial. http://www.arduino.cc.
    • [2] A. Baratloo, N. Singh, T. K. Tsai, et al. Transparent run-time defense against stack-smashing attacks. In USENIX, pages 251{262, 2000.
    • [3] S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: An e cient approach to combat a broad range of memory error exploits. In USENIX Security, pages 105{120, 2003.
    • [4] C. Doukas. Building Internet of Things with the Arduino. CreateSpace Independent Publishing Platform, USA, 2012.
    • [5] A. Francillon and C. Castelluccia. Code injection attacks on harvard-architecture devices. In ACM CCS 2008, pages 15{26. ACM, 2008.
    • [6] S. Gaitan, L. Calderoni, P. Palmieri, M.-C. Ten Veldhuis, D. Maio, and M. van Riemsdijk. From sensing to action: Quick and reliable access to information in cities vulnerable to heavy rain. Sensors Journal, IEEE, 14(12):4175{4184, Dec 2014.
    • [7] N. Gershenfeld, R. Krikorian, and D. Cohen. The internet of things. Scienti c American, 291(4):46{51, 2004.
    • [8] J. Habibi, A. Gupta, S. Carlsony, A. Panicker, and E. Bertino. Mavr: Code reuse stealthy attacks and mitigation on unmanned aerial vehicles. In IEEE ICDCS 2015, pages 642{652. IEEE, 2015.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article