2011 Articles
Reflections on the Engineering and Operation of a Large-Scale Embedded Device Vulnerability Scanner
We present important lessons learned from the engineering and operation of a large-scale embedded device vulnerability scanner infrastructure. Developed and refined over the period of one year, our vulnerability scanner monitored large portions of the Internet and was able to identify over 1.1 million publicly accessible trivially vulnerable embedded devices. The data collected has helped us move beyond vague, anecdotal suspicions of embedded insecurity towards a realistic quantitative understanding of the current threat. In this paper, we describe our experimental methodology and reflect on key technical, organizational and social challenges encountered during our research. We also discuss several key technical design missteps and operational failures and their solutions.
Subjects
Files
-
1978672.1978674.pdf application/pdf 392 KB Download File
Also Published In
- Title
- Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security: BADGERS 2011: April 10, 2011, Salzburg, Austria
- Publisher
- ACM Press
- DOI
- https://doi.org/10.1145/1978672.1978674
More About This Work
- Academic Units
- Computer Science
- Published Here
- October 10, 2012