Is it possible to also attack non-network connected devices?

Broadly, there are two categories of IMDs – network-connected and non-network connected IMDs – and each category has very specific security risks and vulnerabilities. Adversaries, hackers, and attackers may exploit specific vulnerabilities of these devices using various cyber exploitation techniques and network-related attacks. In general, attacks on the Internet of Things (IoT) systems and devices are also applicable to IMDs. Additionally, attackers may use Electromagnetic Interference (EMI) attacks – a subcategory of Signal Injection Attacks – to target IMDs regardless of whether they are connected to a network or function as standalone devices. Unintentional risks to IMDs include unexpected device failure, unexpected battery leaks, vulnerabilities in software patches/updates, insecure data exchange and storage, and unexpected device-related infections. For example, data-dependent electromagnetic emanations, as well as variations in power consumption can reveal the information processed by a device, with or without the help of intentional faults. However, attacks exploiting hardware imperfections are not limited to side-channel leakage of confidential data: recent research has shown that the integrity of sensor measurements can be targeted in a similar out-of-band fashion.

Categories: Info

0 Comments

Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *