메뉴 건너뛰기




Volumn 62, Issue 1, 2016, Pages 39-44

Secure firmware validation and update for consumer devices in home networking

Author keywords

authentication; Firmware validation; integrity; security analysis

Indexed keywords

APPLICATION PROGRAMS; AUTHENTICATION; COMPUTER VIRUSES; CONSUMER ELECTRONICS; EMBEDDED SYSTEMS; HOME NETWORKS; PERSONAL COMPUTERS; SECURITY SYSTEMS; SMART CARDS;

EID: 84964317984     PISSN: 00983063     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCE.2016.7448561     Document Type: Article
Times cited : (55)

References (17)
  • 1
    • 85013802585 scopus 로고    scopus 로고
    • Gartner says 4.9 billion connected " things" will be in use in 2015
    • November
    • Gartner, "Gartner Says 4.9 Billion Connected " Things" Will Be in Use in 2015," Gartner Newsroom, November 2014.
    • (2014) Gartner Newsroom
    • Gartner1
  • 2
    • 84964399843 scopus 로고    scopus 로고
    • Proofpoint uncovers Internet of Things (IoT) cyberattack
    • January
    • Proofpoint, "Proofpoint Uncovers Internet of Things (IoT) Cyberattack," Proofpoint Release, January 2014.
    • (2014) Proofpoint Release
    • Proofpoint1
  • 3
    • 84953273645 scopus 로고    scopus 로고
    • Remote exploitation of an unaltered passenger vehicle
    • August
    • C. Miller and C. Valaek, "Remote Exploitation of an Unaltered Passenger Vehicle," Black Hat USA, August 2015.
    • (2015) Black Hat USA
    • Miller, C.1    Valaek, C.2
  • 4
    • 84891678795 scopus 로고    scopus 로고
    • Automating configuration system and protocol for next-generation home appliances
    • December
    • E.-S. Lee, H.-J. Lee, K. Lee, and J.-H. Park, "Automating Configuration System and Protocol for Next-Generation Home Appliances," ETRI Journal, vol. 35, no. 6, pp. 1094-1104, December 2013.
    • (2013) ETRI Journal , vol.35 , Issue.6 , pp. 1094-1104
    • Lee, E.-S.1    Lee, H.-J.2    Lee, K.3    Park, J.-H.4
  • 6
    • 84964352673 scopus 로고    scopus 로고
    • BADUSB - On accessories that turn evil
    • August
    • K. Nohl and J. Lell, "BADUSB - On Accessories that Turn Evil," Black Hat USA, August 2014.
    • (2014) Black Hat USA
    • Nohl, K.1    Lell, J.2
  • 7
    • 84857354826 scopus 로고    scopus 로고
    • Closer to metal: Reverse engineering the Broadcom NetExtreme's firmware
    • October
    • G. Delugré, "Closer to metal: Reverse engineering the Broadcom NetExtreme's firmware," Hack.lu, October 2010.
    • (2010) Hack.lu
    • Delugré, G.1
  • 8
    • 85051303523 scopus 로고    scopus 로고
    • How the NSA's firmware hacking works and why it's so unsettling
    • February
    • K. Zetter, "How the NSA's Firmware Hacking Works and Why It's So Unsettling", Wired, February 2015.
    • (2015) Wired
    • Zetter, K.1
  • 9
    • 84964391522 scopus 로고    scopus 로고
    • Battery firmware hacking
    • August
    • C. Miller, "Battery Firmware Hacking," Defcon 19, August 2011.
    • (2011) Defcon 19
    • Miller, C.1
  • 11
    • 70350192121 scopus 로고    scopus 로고
    • PKG-VUL: Security vulnerability evaluation and patch framework for package-based systems
    • October
    • J.-H. Lee, S.-G. Sohn, B.-H. Chang, and T.-M. Chung, "PKG-VUL: Security Vulnerability Evaluation and Patch Framework for Package-based Systems," ETRI Journal, vol. 31, no. 5, pp. 554-564, October 2009.
    • (2009) ETRI Journal , vol.31 , Issue.5 , pp. 554-564
    • Lee, J.-H.1    Sohn, S.-G.2    Chang, B.-H.3    Chung, T.-M.4
  • 12
    • 84930669455 scopus 로고    scopus 로고
    • A novel ID-based authentication and key exchange protocol resistant to ephemeral-secret-leakage attacks for mobile devices
    • Y.-M. Tseng, S.-S. Huang, T.-T. Tsai, and L. Tseng, "A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices," International Journal of Distributed Sensor Networks, vol. 2015, Article ID 898716, 2015.
    • (2015) International Journal of Distributed Sensor Networks , vol.2015
    • Tseng, Y.-M.1    Huang, S.-S.2    Tsai, T.-T.3    Tseng, L.4
  • 13
    • 4043122631 scopus 로고    scopus 로고
    • A dynamic ID-based remote user authentication scheme
    • May
    • M. Das, A. Saxena, and V. Gulati, "A Dynamic ID-based Remote User Authentication Scheme," IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 629-631, May 2004.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.2 , pp. 629-631
    • Das, M.1    Saxena, A.2    Gulati, V.3
  • 14
    • 84930984974 scopus 로고    scopus 로고
    • Securing mobile Ad Hoc networks using enhanced identity-based cryptography
    • June
    • K. Mehr and J. Niya, "Securing Mobile Ad Hoc Networks Using Enhanced Identity-Based Cryptography," ETRI Journal, vol. 37, no. 3, pp. 512-522, June 2015.
    • (2015) ETRI Journal , vol.37 , Issue.3 , pp. 512-522
    • Mehr, K.1    Niya, J.2
  • 15
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • January
    • C. Schnorr, "Efficient signature generation by smart cards," Journal of Cryptology, vol. 4, no. 3, pp. 161-174, January 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.1
  • 16
    • 84926037301 scopus 로고    scopus 로고
    • Secure pseudonym-based near field communication protocol for the consumer internet of things
    • February
    • D. He, N. Kumar, and J.-H. Lee, "Secure Pseudonym-based Near Field Communication Protocol for the Consumer Internet of Things," IEEE Transactions on Consumer Electronics, vol. 61, no. 1, pp. 56-62, February 2015.
    • (2015) IEEE Transactions on Consumer Electronics , vol.61 , Issue.1 , pp. 56-62
    • He, D.1    Kumar, N.2    Lee, J.-H.3
  • 17
    • 77954732460 scopus 로고    scopus 로고
    • On the security of an enhanced novel access control protocol for wireless sensor networks
    • May
    • P. Zeng, K. Choo, and D. Sun, "On the Security of an Enhanced Novel Access Control Protocol for Wireless Sensor Networks," IEEE Transactions on Consumer Electronics, vol. 56, no. 2, pp. 566-569, May 2010.
    • (2010) IEEE Transactions on Consumer Electronics , vol.56 , Issue.2 , pp. 566-569
    • Zeng, P.1    Choo, K.2    Sun, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.