Abstract
The Internet of Things (IoT) is a term given to the wide variety of connected devices, which now are inescapable in our daily lives. Examples of common IoT devices found in many homes and businesses include light bulbs, smart speakers, door locks and cameras. This chapter begins with an introduction to the specific IoT device and architecture, along with a discussion of the threat model and the bootloader and encryption used for firmware updates on this device. It presents a side-channel attack on the bootloader and allows us to send firmware, which will be accepted by the device. The chapter presents a brief summary of the required work to form a complete attack. It focuses on the demonstration of how knowledge about the attacks and AES implementation is applied in "real life". Finding the AES key for the bootloader allows signing of firmware images that will be accepted by the lamp.
| Original language | English |
|---|---|
| Title of host publication | Embedded Cryptography 3 |
| Pages | 279-295 |
| Number of pages | 17 |
| ISBN (Electronic) | 9781394351930 |
| DOIs | |
| State | Published - 29 Jan 2025 |
Keywords
- AES implementation
- Bootloader
- Encryption
- Firmware updates
- Internet of Things
- Light bulbs
- Threat model
All Science Journal Classification (ASJC) codes
- General Computer Science
- General Mathematics
Fingerprint
Dive into the research topics of 'Attacking IoT light bulbs'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver