Skip to main navigation Skip to search Skip to main content

Risk management in embedded devices using metering applications as example

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

Along with the rise in use of everyday life electronic products that collect and communicate personal data, there is an increasing need for adequate security. The use of ultra-low-power MCUs in such applications provides a clear ad-vantage in terms of energy consumption. However, given their general-purpose nature and low-power needs, security has not been the main focus in the past. This work places emphasis on methodologically analyzing open security gaps at a system level and providing a score for each vulnerability found. Such vulnerability scores help prioritize the efforts towards building a secure system and balancing the trade-off between suitable protection and minimal cost. The work presented uses as an example an abstraction of metering applications implemented using a general purpose microcontroller. The presented approach makes use of the Common Vulnerability Scoring System open framework to quantify the impact of possible vulnerabilities and prioritize their re-mediation based on their relevancy.

Original languageEnglish
Title of host publicationProceedings of the 9th Workshop on Embedded Systems Security, WESS 2014
PublisherAssociation for Computing Machinery
ISBN (Electronic)9781450329323
DOIs
StatePublished - 12 Oct 2014
Event9th Workshop on Embedded Systems Security, WESS 2014 - New Delhi, India
Duration: 12 Oct 201417 Oct 2014

Publication series

NameProceedings of the 9th Workshop on Embedded Systems Security, WESS 2014

Conference

Conference9th Workshop on Embedded Systems Security, WESS 2014
Country/TerritoryIndia
CityNew Delhi
Period12/10/1417/10/14

Keywords

  • CVSS
  • Embedded devices
  • Metering
  • Risk management
  • Security

Fingerprint

Dive into the research topics of 'Risk management in embedded devices using metering applications as example'. Together they form a unique fingerprint.

Cite this