<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Realizing the IoT&#8217;s security imperative &#124; EDN</title>
	<atom:link href="http://www.epanorama.net/blog/2017/04/08/realizing-the-iots-security-imperative-edn/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2017/04/08/realizing-the-iots-security-imperative-edn/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 26 Apr 2026 07:22:53 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/04/08/realizing-the-iots-security-imperative-edn/comment-page-1/#comment-1543473</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 10 Apr 2017 10:37:49 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=54141#comment-1543473</guid>
		<description><![CDATA[Security expert Peter Neumann discussed the government project he works on that aims to pave a road to provably secure systems. He is a principal investigator for the Defense Advanced Research Projects Agency on CRASH (Clean-Slate Design of Resilient, Adaptive, Secure Hosts), a program that aims to build self-healing systems resistant to cyber attacks.

Such systems are sorely needed. Even today’s devices using a hardware root-of-trust such as ARM’s TrustZone are liable to side-channel attacks or fault injections based on monitoring a system’s power use or sending disrupting energy pulses.

“The IoT cannot possibly survive in the long run if there is no security… There’s no hope if we continue on the path we’re on of putting more and more things online that can be compromised either directly or through the network they are on,” he said, calling companies that advertise they can secure the IoT “a fantastic fraud” and “all smoke and mirrors.”

The CRASH program has developed a formal spec for a 64-bit MIPS system that uses special instructions so “if you don’t have right credentials, you can’t get at an associated object, which might be an entire database or app,”

Even if it’s successful it’s not bulletproof. “You still face key management issues, denial-of-service attacks and insider misuse like a Snowden attack, which is one of worst problems of all,” he said.

Source: http://www.eetimes.com/document.asp?doc_id=1331567&amp;page_number=2]]></description>
		<content:encoded><![CDATA[<p>Security expert Peter Neumann discussed the government project he works on that aims to pave a road to provably secure systems. He is a principal investigator for the Defense Advanced Research Projects Agency on CRASH (Clean-Slate Design of Resilient, Adaptive, Secure Hosts), a program that aims to build self-healing systems resistant to cyber attacks.</p>
<p>Such systems are sorely needed. Even today’s devices using a hardware root-of-trust such as ARM’s TrustZone are liable to side-channel attacks or fault injections based on monitoring a system’s power use or sending disrupting energy pulses.</p>
<p>“The IoT cannot possibly survive in the long run if there is no security… There’s no hope if we continue on the path we’re on of putting more and more things online that can be compromised either directly or through the network they are on,” he said, calling companies that advertise they can secure the IoT “a fantastic fraud” and “all smoke and mirrors.”</p>
<p>The CRASH program has developed a formal spec for a 64-bit MIPS system that uses special instructions so “if you don’t have right credentials, you can’t get at an associated object, which might be an entire database or app,”</p>
<p>Even if it’s successful it’s not bulletproof. “You still face key management issues, denial-of-service attacks and insider misuse like a Snowden attack, which is one of worst problems of all,” he said.</p>
<p>Source: <a href="http://www.eetimes.com/document.asp?doc_id=1331567&#038;page_number=2" rel="nofollow">http://www.eetimes.com/document.asp?doc_id=1331567&#038;page_number=2</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/04/08/realizing-the-iots-security-imperative-edn/comment-page-1/#comment-1543472</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 10 Apr 2017 10:37:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=54141#comment-1543472</guid>
		<description><![CDATA[Dan Goodin / Ars Technica:
Researchers uncover BrickerBot-powered botnet attacks that are designed to brick poorly secured Linux-based routers and other IoT devices

Rash of in-the-wild attacks permanently destroys poorly secured IoT devices
Ongoing “BrickerBot” attacks might be trying to kill devices before they can join a botnet.
https://arstechnica.com/security/2017/04/rash-of-in-the-wild-attacks-permanently-destroys-poorly-secured-iot-devices/]]></description>
		<content:encoded><![CDATA[<p>Dan Goodin / Ars Technica:<br />
Researchers uncover BrickerBot-powered botnet attacks that are designed to brick poorly secured Linux-based routers and other IoT devices</p>
<p>Rash of in-the-wild attacks permanently destroys poorly secured IoT devices<br />
Ongoing “BrickerBot” attacks might be trying to kill devices before they can join a botnet.<br />
<a href="https://arstechnica.com/security/2017/04/rash-of-in-the-wild-attacks-permanently-destroys-poorly-secured-iot-devices/" rel="nofollow">https://arstechnica.com/security/2017/04/rash-of-in-the-wild-attacks-permanently-destroys-poorly-secured-iot-devices/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
