Portada: Infraestructura para la Logística Sustentable 2050
DESTACADO | CPI Propone - Resumen Ejecutivo

Infraestructura para el desarrollo que queremos 2026-2030

Elaborado por el Consejo de Políticas de Infraestructura (CPI), este documento constituye una hoja de ruta estratégica para orientar la inversión y la gestión de infraestructura en Chile. Presenta propuestas organizadas en siete ejes estratégicos, sin centrarse en proyectos específicos, sino en influir en las decisiones de política pública para promover una infraestructura que conecte territorios, genere oportunidades y eleve la calidad de vida de la población.
ARTÍCULO
TITULO

Exploiting JTAG and Its Mitigation in IOT: A Survey

Gopal Vishwakarma and Wonjun Lee    

Resumen

Nowadays, companies are heavily investing in the development of ?Internet of Things(IoT)? products. These companies usually and obviously hunt for lucrative business models. Currently, each person owns at least 3?4 devices (such as mobiles, personal computers, Google Assistant, Alexa, etc.) that are connected to the Internet 24/7. However, in the future, there might be hundreds of devices that will be constantly online behind each person, keeping track of body health, banking transactions, status of personal devices, etc. to make one?s life more efficient and streamlined. Thus, it is very crucial that each device should be highly secure since one?s life will become dependent on these devices. However, the current security of IoT devices is mainly focused on resiliency of device. In addition, less complex node devices are easily accessible to the public resulting in higher vulnerability. JTAG is an IEEE standard that has been defined to test proper mounting of components on PCBs (printed circuit boards) and has been extensively used by PCB manufacturers to date. This JTAG interface can be used as a backdoor entry to access and exploit devices, also defined as a physical attack. This attack can be used to make products malfunction, modify data, or, in the worst case, stop working. This paper reviews previous successful JTAG exploitations of well-known devices operating online and also reviews some proposed possible solutions to see how they can affect IoT products in a broader sense.

Palabras claves

Artículos similares

Hemos preparados una selección de otros artículos que pudieran ser de tu interés
Gopal Vishwakarma and Wonjun Lee    
Nowadays, companies are heavily investing in the development of ?Internet of Things(IoT)? products. These companies usually and obviously hunt for lucrative business models. Currently, each person owns at least 3?4 devices (such as mobiles, personal comp... ver más
Revista: Future Internet
Abigail Luxton and Marin Marinov    
Terrorism is an ever-present threat that is becoming more prevalent in today?s society. The railway has always been a favourable target for terrorists due to the high volume of people that utilise it, as well as the vital services it provides to the nati... ver más
Revista: Sustainability
Melissa Carlton, Yair Levy     Pág. 16 - 28
Cyber threats have been growing with social engineering and business e-mail compromise reported as the two most rising penetration vectors. Advanced Persistent Threats (APTs) are penetration techniques that combine several approaches to gain access to or... ver más
Jianmin Wang,Yongzhan Zhang     Pág. pp. 52 - 56
Sensor network technology is one of the most promising technologies in the high technology field. Building integrated multi-sensor disaster monitoring system based on sensor network technology is the main direction of the intelligent disaster monitoring ... ver más