The Internet of Things (IoT) is growing at an unprecedented speed, with over 16.6 billion connected devices in 2023 and projections of around 40 billion by 2030. However, this exponential growth is accompanied by serious security issues within an IoT device supply chain. By analysing case studies, the research identifies how individual vulnerabilities in supply chain can compromise the overall security of devices. Since firmware development is an integral part of an IoT supply chain, any weakness at this stage has large-scale security and reliability repercussions. This research focuses on security vulnerabilities arising from weaknesses in IoT firmware development, examining key challenges. The paper also introduces the energy robustness concept, which consists of encouraging developers to consider the amount of joules consumed by a firmware in a specific time frame for the purpose of determining the empiric degree of device robusteness to its inherent vulnerabilities and to external attacks. As a practical solution, we present Lich, a firmware analysis tool that executes a sequence of security and energy consumption tools with the objective of discovering vulnerabilities at an early stage of development and before a firmware deployment. The research aims to demonstrate, on a theoretical level, that the implementation of continuous controls can improve the reliability and security of the IoT supply chain.

Lich: Enhancing IoT Supply Chain Security Through Automated Firmware Analysis / Aldini, Alessandro; Ardito, Luca; Bianco, Giuseppe Marco; Valsesia, Michele. - (2025), pp. 747-754. (Intervento presentato al convegno IEEE DCOSS-IoT 2025 tenutosi a Lucca (ITA) nel 09-11 June 2025) [10.1109/DCOSS-IoT65416.2025.00114].

Lich: Enhancing IoT Supply Chain Security Through Automated Firmware Analysis

Ardito, Luca;Bianco, Giuseppe Marco;Valsesia, Michele
2025

Abstract

The Internet of Things (IoT) is growing at an unprecedented speed, with over 16.6 billion connected devices in 2023 and projections of around 40 billion by 2030. However, this exponential growth is accompanied by serious security issues within an IoT device supply chain. By analysing case studies, the research identifies how individual vulnerabilities in supply chain can compromise the overall security of devices. Since firmware development is an integral part of an IoT supply chain, any weakness at this stage has large-scale security and reliability repercussions. This research focuses on security vulnerabilities arising from weaknesses in IoT firmware development, examining key challenges. The paper also introduces the energy robustness concept, which consists of encouraging developers to consider the amount of joules consumed by a firmware in a specific time frame for the purpose of determining the empiric degree of device robusteness to its inherent vulnerabilities and to external attacks. As a practical solution, we present Lich, a firmware analysis tool that executes a sequence of security and energy consumption tools with the objective of discovering vulnerabilities at an early stage of development and before a firmware deployment. The research aims to demonstrate, on a theoretical level, that the implementation of continuous controls can improve the reliability and security of the IoT supply chain.
2025
979-8-3315-4372-3
File in questo prodotto:
File Dimensione Formato  
Lich: Enhancing IoT Supply Chain SecurityThrough Automated Firmware Analysis.pdf

accesso aperto

Descrizione: Lich è un software che consente di rilevare le vulnerabilità di un firmware, oltre al suo consumo energetico, tramite l'esecuzione di uno o più software oper source.
Tipologia: 2. Post-print / Author's Accepted Manuscript
Licenza: Pubblico - Tutti i diritti riservati
Dimensione 145.79 kB
Formato Adobe PDF
145.79 kB Adobe PDF Visualizza/Apri
Lich_Enhancing_IoT_Supply_Chain_Security_Through_Automated_Firmware_Analysis.pdf

accesso riservato

Tipologia: 2a Post-print versione editoriale / Version of Record
Licenza: Non Pubblico - Accesso privato/ristretto
Dimensione 208.83 kB
Formato Adobe PDF
208.83 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/3001852