mirror of
https://github.com/fkie-cad/awesome-embedded-and-iot-security.git
synced 2024-09-28 16:25:37 +00:00
Compare commits
4 Commits
8aff0c0538
...
8e3c90efc0
Author | SHA1 | Date | |
---|---|---|---|
|
8e3c90efc0 | ||
|
fbd0301e66 | ||
|
3bc3511e79 | ||
|
05b79bc3ef |
5
.github/workflows/awesome-lint.yml
vendored
5
.github/workflows/awesome-lint.yml
vendored
@ -13,7 +13,4 @@ jobs:
|
||||
- uses: actions/checkout@v2
|
||||
with:
|
||||
fetch-depth: 0 # fix remark-lint:awesome-git-repo-age
|
||||
- name: Test awesome-lint with custom file path
|
||||
uses: jthegedus/github-action-awesome-lint@68fc989d5a01aa127ce502a59f72ebe4166386f1 # commit_sha of tag v0.1.0
|
||||
with:
|
||||
args: 'readme.md'
|
||||
- run: 'npx awesome-lint "readme.md"'
|
||||
|
10
readme.md
10
readme.md
@ -1,3 +1,4 @@
|
||||
<!--lint ignore awesome-license-->
|
||||
<div align="center">
|
||||
<img width="500" height="350" src="iot_awesome_logo.svg" alt="Awesome">
|
||||
<br />
|
||||
@ -8,8 +9,8 @@
|
||||
> A curated list of awesome resources about embedded and IoT security. The list contains software and hardware tools, books, research papers and more.
|
||||
|
||||
Botnets like [Mirai](<https://en.wikipedia.org/wiki/Mirai_(malware)>) have proven that there is a need for more security in embedded and IoT devices. This list shall help beginners and experts to find helpful resources on the topic.
|
||||
If you are a beginner, you should have a look at the <ins>*Books*</ins> and <ins>*Case Studies*</ins> sections.
|
||||
If you want to start right away with your own analysis, you should give the <ins>*Analysis Frameworks*</ins> a try.
|
||||
If you are a beginner, you should have a look at the <ins>_Books_</ins> and <ins>_Case Studies_</ins> sections.
|
||||
If you want to start right away with your own analysis, you should give the <ins>_Analysis Frameworks_</ins> a try.
|
||||
They are easy to use and you do not need to be an expert to get first meaningful results.
|
||||
|
||||
> Items marked with :euro: are comercial products.
|
||||
@ -34,6 +35,7 @@ They are easy to use and you do not need to be an expert to get first meaningful
|
||||
- [Websites](#websites)
|
||||
- [Blogs](#blogs)
|
||||
- [Tutorials and Technical Background](#tutorials-and-technical-background)
|
||||
- [YouTube Channels](#youtube-channels)
|
||||
- [Conferences](#conferences)
|
||||
- [Contribute](#contribute)
|
||||
- [License](#license)
|
||||
@ -58,6 +60,7 @@ Software tools for analyzing embedded/IoT devices and firmware.
|
||||
### Analysis Tools
|
||||
|
||||
- [Binwalk](https://github.com/ReFirmLabs/binwalk) - Searches a binary for "interesting" stuff, as well as extracts arbitrary files.
|
||||
- [cwe\_checker](https://github.com/fkie-cad/cwe_checker) - Finds vulnerable patterns in binary executables - ELF support for x86, ARM, and MIPS, experimental bare-metal support.
|
||||
- [emba](https://github.com/e-m-b-a/emba) - Analyze Linux-based firmware of embedded devices.
|
||||
- [Firmadyne](https://github.com/firmadyne/firmadyne) - Tries to emulate and pentest a firmware.
|
||||
- [Firmwalker](https://github.com/craigz28/firmwalker) - Searches extracted firmware images for interesting files and information.
|
||||
@ -125,6 +128,7 @@ Software tools for analyzing embedded/IoT devices and firmware.
|
||||
|
||||
## Books
|
||||
|
||||
- 2023, Perry Lea: [Edge Computing Technology and Applications](https://www.manning.com/books/edge-computing-technology-and-applications)
|
||||
- 2020, Fotios Chantzis, Evangel Deirme, Ioannis Stais, Paulino Calderon, Beau Woods: [Practical IoT Hacking](https://www.amazon.com/Fotios-Chantzis-ebook/dp/B085BVVSN6/)
|
||||
- 2020, Jasper van Woudenberg, Colin O'Flynn: [The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks](https://nostarch.com/hardwarehacking)
|
||||
- 2019, Yago Hansen: [The Hacker's Hardware Toolkit: The best collection of hardware gadgets for Red Team hackers, Pentesters and security researchers](https://github.com/yadox666/The-Hackers-Hardware-Toolkit/blob/master/TheHackersHardwareToolkit.pdf)
|
||||
@ -145,6 +149,7 @@ Software tools for analyzing embedded/IoT devices and firmware.
|
||||
## Research Papers
|
||||
|
||||
<!--lint ignore match-punctuation-->
|
||||
|
||||
- 2020, Oser et al: [SAFER: Development and Evaluation of an IoT Device Risk Assessment Framework in a Multinational Organization](https://dl.acm.org/doi/abs/10.1145/3414173)
|
||||
- 2019, Agarwal et al: [Detecting IoT Devices and How They Put Large Heterogeneous Networks at Security Risk](https://www.mdpi.com/1424-8220/19/19/4107)
|
||||
- 2019, Almakhdhub et al: [BenchIoT: A Security Benchmark for the Internet of Things](https://nebelwelt.net/publications/files/19DSN.pdf)
|
||||
@ -226,6 +231,7 @@ Software tools for analyzing embedded/IoT devices and firmware.
|
||||
- [UART explained](https://www.mikroe.com/blog/uart-serial-communication) - An in depth explanation of the UART protocol.
|
||||
|
||||
### YouTube Channels
|
||||
|
||||
- [Flashback Team](https://www.youtube.com/c/FlashbackTeam) - A duo of hackers explaining their step by step approach to finding and exploiting vulnerabilities in embedded devices.
|
||||
- [StackSmashing](https://www.youtube.com/c/stacksmashing) - Reverse engineering and hardware hacking of embedded devices.
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user