The Internet of Things (IoT) is growing at an unprecedented speed, with over 16.6 billion connected devices in 2023 and projections of around 40 billion by 2030. However, this exponential growth is accompanied by serious security issues within an IoT device supply chain. By analysing case studies, the research identifies how individual vulnerabilities in supply chain can compromise the overall security of devices. Since firmware development is an integral part of an IoT supply chain, any weakness at this stage has large-scale security and reliability repercussions. This research focuses on security vulnerabilities arising from weaknesses in IoT firmware development, examining key challenges. The paper also introduces the energy robustness concept, which consists of encouraging developers to consider the amount of joules consumed by a firmware in a specific time frame for the purpose of determining the empiric degree of device robusteness to its inherent vulnerabilities and to external attacks. As a practical solution, we present Lich, a firmware analysis tool that executes a sequence of security and energy consumption tools with the objective of discovering vulnerabilities at an early stage of development and before a firmware deployment. The research aims to demonstrate, on a theoretical level, that the implementation of continuous controls can improve the reliability and security of the IoT supply chain.
Lich: Enhancing IoT Supply Chain Security Through Automated Firmware Analysis / Aldini, Alessandro; Ardito, Luca; Bianco, Giuseppe Marco; Valsesia, Michele. - (2025), pp. 747-754. (Intervento presentato al convegno IEEE DCOSS-IoT 2025 tenutosi a Lucca (ITA) nel 09-11 June 2025) [10.1109/DCOSS-IoT65416.2025.00114].
Lich: Enhancing IoT Supply Chain Security Through Automated Firmware Analysis
Ardito, Luca;Bianco, Giuseppe Marco;Valsesia, Michele
2025
Abstract
The Internet of Things (IoT) is growing at an unprecedented speed, with over 16.6 billion connected devices in 2023 and projections of around 40 billion by 2030. However, this exponential growth is accompanied by serious security issues within an IoT device supply chain. By analysing case studies, the research identifies how individual vulnerabilities in supply chain can compromise the overall security of devices. Since firmware development is an integral part of an IoT supply chain, any weakness at this stage has large-scale security and reliability repercussions. This research focuses on security vulnerabilities arising from weaknesses in IoT firmware development, examining key challenges. The paper also introduces the energy robustness concept, which consists of encouraging developers to consider the amount of joules consumed by a firmware in a specific time frame for the purpose of determining the empiric degree of device robusteness to its inherent vulnerabilities and to external attacks. As a practical solution, we present Lich, a firmware analysis tool that executes a sequence of security and energy consumption tools with the objective of discovering vulnerabilities at an early stage of development and before a firmware deployment. The research aims to demonstrate, on a theoretical level, that the implementation of continuous controls can improve the reliability and security of the IoT supply chain.File | Dimensione | Formato | |
---|---|---|---|
Lich: Enhancing IoT Supply Chain SecurityThrough Automated Firmware Analysis.pdf
accesso aperto
Descrizione: Lich è un software che consente di rilevare le vulnerabilità di un firmware, oltre al suo consumo energetico, tramite l'esecuzione di uno o più software oper source.
Tipologia:
2. Post-print / Author's Accepted Manuscript
Licenza:
Pubblico - Tutti i diritti riservati
Dimensione
145.79 kB
Formato
Adobe PDF
|
145.79 kB | Adobe PDF | Visualizza/Apri |
Lich_Enhancing_IoT_Supply_Chain_Security_Through_Automated_Firmware_Analysis.pdf
accesso riservato
Tipologia:
2a Post-print versione editoriale / Version of Record
Licenza:
Non Pubblico - Accesso privato/ristretto
Dimensione
208.83 kB
Formato
Adobe PDF
|
208.83 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/3001852