1.1.2 Common Threats in Embedded Systems

  • Firmware tampering:
    • Replacing or modifying firmware to insert malware or bypass security features. This is often done via physical access (UART or JTAG, for example) or over-the-air (OTA) updates.
  • Unauthorized code execution:
    • Exploiting bootloaders or update mechanisms to run custom (unsigned) code.
  • Reverse engineering and IP theft:
    • Extracting firmware to discover proprietary algorithms or cryptographic material.
  • Key extraction:
    • Reading secrets or signing keys from insecure Flash, RAM or debugging interfaces.
  • Rollback attacks:
    • Reinstalling older, vulnerable firmware versions that bypass security.
  • Supply chain attacks:
    • Compromising the device before deployment (during manufacturing or transit, for example).
  • Side-channel and fault injection attacks:
    • Using physical methods (such as glitching, voltage manipulation or EM analysis) to extract secrets or disrupt normal execution.
  • Denial of Service (DoS):
    • Disrupting normal operation by corrupting critical software or resources.