PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.
During the past decade, smartphone developers have been improving security mechanisms in smartphone runtimes out of necessity. Unfortunately, these security improvements have frequently been left unimplemented in the smartphone’s corresponding baseband controller, and notable exploitations have occurred as a result. Developers of all cyber physical systems should take note: any processor running software could be the target of an attack; especially if that software processes raw inputs from sensors. In this paper we investigate specific exploitations that have been proven effective against baseband controllers, and examine the methodologies recommended by the exploit authors to protect against them. We conclude by presenting some design and implementation techniques that can be used to enhance the security posture of mindful developers of cyber physical systems.
Thomas Macklin,Paul West, andThomas Johnson
"Learning lessons from smart phone developers for cyber physical systems", Proc. SPIE 11419, Disruptive Technologies in Information Sciences IV, 114190P (18 May 2020); https://doi.org/10.1117/12.2558933
ACCESS THE FULL ARTICLE
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.
The alert did not successfully save. Please try again later.
Thomas Macklin, Paul West, Thomas Johnson, "Learning lessons from smart phone developers for cyber physical systems," Proc. SPIE 11419, Disruptive Technologies in Information Sciences IV, 114190P (18 May 2020); https://doi.org/10.1117/12.2558933