Hardware Security

Introduction

It is expected that by 2030, there will be approximately 29.4 billion active IoT devices around the world. Internet of Things (IoT) devices are relatively small and have limited hardware resources. Due to these limitations, IoT devices are extremely vulnerable to a variety of cyber attacks. These attacks put user’s personal information at risk, contributing to the increase in cyber crime.

Description

Investigate and identify vulnerabilities in the physical components of IoT devices, using the Attify Hardware Penetration Testing Techniques kit and lab guides. 

Problem & Hypothesis

Problem

In 2021, there were more than 1 billion IoT attacks worldwide. These attacks took advantage of the vulnerabilities in hardware components of these devices. This is mainly because the components used in IoT devices rarely have the ability to defend themselves against malware. This problem is made worse when we consider the exponential growth in adoption of IoT devices and the over-reliance people have come to accept these past couple of years.

 

Hypothesis

Objectives

  1. Exploit vulnerabilities identified in IoT devices with the purpose of mitigate them.
  2. Achieve mastery of the Attify Kit by completing it in its entirety.
  3. ⁠Increase people’s awareness about potential risks.
  4. ⁠Improve our expertise in the field of penetration testing.
 

Members

Presentation Video

Research Poster