Bluetooth Security Analysis in IoT Scenarios

Bluetooth Security Analysis in IoT Scenarios

1 Introduction Bluetooth technology has been widely applied in various scenarios such as personal electronics, automotive electronics, smart homes, smart cities, and industrial IoT, gaining support from over 30,000 manufacturers. The number of Bluetooth-enabled devices has reached 3.6 billion, and it is expected to rise to 5.2 billion by 2020. Bluetooth is currently one of … Read more

Free Course on Assembly Language and Binary Vulnerabilities

Free Course on Assembly Language and Binary Vulnerabilities

I don’t know when learning programming became a headache. There are always those late nights when I look up at the bright moon, wondering when I can fully grasp assembly language and become the dream of countless girls. But reality always hits hard…. There are many moments when I feel the urge to smash my … Read more

Research on PLC Attack Paths in Industrial Control Systems Security

Research on PLC Attack Paths in Industrial Control Systems Security

Abstract PLC (Programmable Logic Controller) is a fundamental control device in critical infrastructure, and its security is crucial for the stable operation of the entire control system. However, with the deepening integration of information technology and industrialization, as well as the advancement of Industry 4.0, the information security issues of industrial control systems have become … Read more

Analysis Report on Malicious Activities of Hacker Organizations Using BusyBox Components for IoT Device Attacks

Analysis Report on Malicious Activities of Hacker Organizations Using BusyBox Components for IoT Device Attacks

Author | Zhang Jiaqiu Liu Zhongjin 1 Introduction to BusyBox Components BusyBox is a commonly used component in embedded Linux, known as the “Swiss Army Knife of Embedded Linux.” It integrates commonly used UNIX commands into a single executable file. By streamlining functionality and sharing code, BusyBox retains the most commonly used features while significantly … Read more

The Past, Present, and Future of Embedded System Cybersecurity

The Past, Present, and Future of Embedded System Cybersecurity

Author: Tiandi Hexing Industrial Cybersecurity Research Institute Editor’s Note: With the development of ubiquitous connectivity, automation, digitalization, and intelligence, embedded systems play a more important role than ever in realizing new functions of software-driven devices, but new cybersecurity threats have emerged. The threats faced by embedded systems are constantly evolving, which is worth considering. Although … Read more

Multiple Vulnerabilities in Mazda IVI System

Multiple Vulnerabilities in Mazda IVI System

Keywords Security Vulnerabilities Multiple vulnerabilities have been discovered in the Mazda Connectivity Master Unit (CMU) system installed in various models (such as the 2014-2021 Mazda 3). As is often the case, these vulnerabilities were caused by inadequate sanitization when processing input provided by attackers. Actual attackers can exploit these vulnerabilities by connecting specially crafted USB … Read more

In-Depth Guide to Assembly Language and Binary Vulnerabilities

In-Depth Guide to Assembly Language and Binary Vulnerabilities

Learning programming has become a headache for many. There are those late nights when I look up at the bright moon, wondering when I can fully grasp assembly language and fulfill my dreams. But reality always hits hard…. There are many moments when I feel like smashing my keyboard, but we, the brave, will not … Read more