Description update (#7)

* description update

* formatting fixed

* logo uploaded

* logo added

* logo font fixed

* reviewer requested changes

* legend added
This commit is contained in:
Peter Weidenbach 2019-08-26 15:21:01 +02:00 committed by Thomas Barabosch
parent 499f1dcc3c
commit 07c7e28165
2 changed files with 1216 additions and 5 deletions

1201
iot_awesome_logo.svg Normal file

File diff suppressed because one or more lines are too long

After

Width:  |  Height:  |  Size: 95 KiB

View File

@ -1,11 +1,19 @@
<div align="center">
<img width="500" height="350" src="iot_awesome_logo.svg" alt="Awesome">
<br />
</div>
# Awesome Embedded and IoT Security [![Awesome](https://awesome.re/badge.svg)](https://awesome.re) # Awesome Embedded and IoT Security [![Awesome](https://awesome.re/badge.svg)](https://awesome.re)
> A curated list of awesome resources about embedded and IoT security. The list contains software and hardware tools, books, research papers and more. > A curated list of awesome resources about embedded and IoT security. The list contains software and hardware tools, books, research papers and more.
Botnets like [Mirai](https://en.wikipedia.org/wiki/Mirai_(malware)) have proven that there is a need for more security in embedded and IoT devices. This list shall help beginners and experts to find helpful resources on the topic.
If you are a beginner, you should have a look at the [Books](#books) and [Case Studies](#case-studies) sections. If you are a beginner, you should have a look at the [Books](#books) and [Case Studies](#case-studies) sections.
If you want to start right away with your own analysis, you should give the [Analysis Frameworks](#analysis-frameworks) a try. If you want to start right away with your own analysis, you should give the [Analysis Frameworks](#analysis-frameworks) a try.
They are easy to use and you do not need to be an expert to get first meaningful results. They are easy to use and you do not need to be an expert to get first meaningful results.
> *Items marked with :euro: are comercial products.*
## Contents ## Contents
- [Software Tools](#software-tools) - [Software Tools](#software-tools)
@ -16,7 +24,7 @@ They are easy to use and you do not need to be an expert to get first meaningful
- [Hardware Tools](#hardware-tools) - [Hardware Tools](#hardware-tools)
- [Books](#books) - [Books](#books)
- [Research Papers](#research-papers) - [Research Papers](#research-papers)
- [Case Studies](#case-studies) - [Case Studies](#case-studies)
- [Free Trainings](#free-trainings) - [Free Trainings](#free-trainings)
- [Websites](#websites) - [Websites](#websites)
- [Conferences](#conferences) - [Conferences](#conferences)
@ -100,7 +108,7 @@ Software tools for analyzing embedded/IoT firmware.
s](http://www.s3.eurecom.fr/docs/usenixsec14_costin.pdf) s](http://www.s3.eurecom.fr/docs/usenixsec14_costin.pdf)
- 2013, Davidson et al: [FIE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution](https://www.usenix.org/system/files/conference/usenixsecurity13/sec13-paper_davidson.pdf) - 2013, Davidson et al: [FIE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution](https://www.usenix.org/system/files/conference/usenixsecurity13/sec13-paper_davidson.pdf)
### Case Studies ## Case Studies
- [Hacking the DSP-W215, Again](http://www.devttys0.com/2014/05/hacking-the-dspw215-again/) - [Hacking the DSP-W215, Again](http://www.devttys0.com/2014/05/hacking-the-dspw215-again/)
- [Multiple vulnerabilities found in the D-link DWR-932B](https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html) - [Multiple vulnerabilities found in the D-link DWR-932B](https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html)
@ -120,14 +128,16 @@ s](http://www.s3.eurecom.fr/docs/usenixsec14_costin.pdf)
## Websites ## Websites
- [OWASP Embedded Application Security](https://www.owasp.org/index.php/OWASP_Embedded_Application_Security) - [OWASP Embedded Application Security Project](https://www.owasp.org/index.php/OWASP_Embedded_Application_Security) - Development best practices and list of hardware and software tools.
- [OWASP Internet of Things Project](https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project) - [OWASP Internet of Things Project](https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project) - IoT common vulnerabilities and attack surfaces.
- [Hacking Printers Wiki](http://hacking-printers.net/wiki/index.php/Main_Page) - [Hacking Printers Wiki](http://hacking-printers.net/wiki/index.php/Main_Page)
- [Router Passwords](https://www.routerpasswords.com) - Default login credential database sorted by manufacturer. - [Router Passwords](https://www.routerpasswords.com) - Default login credential database sorted by manufacturer.
## Conferences ## Conferences
Conferences focused on embedded and/or IoT security.
- [Hardwear.io](https://hardwear.io/) - [Hardwear.io](https://hardwear.io/) - The Hague, September.
- [Hardwear.io USA](https://hardwear.io/) - Santa Clara, June.
## Contribute ## Contribute