{"id":25448,"date":"2014-08-12T01:41:05","date_gmt":"2014-08-12T05:41:05","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25448"},"modified":"2014-08-12T01:41:05","modified_gmt":"2014-08-12T05:41:05","slug":"study-finds-firmware-plagued-by-poor-encryption-and-backdoors","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/study-finds-firmware-plagued-by-poor-encryption-and-backdoors.php","title":{"rendered":"Study finds firmware plagued by poor encryption and backdoors"},"content":{"rendered":"<p><p>    The    first large-scale analysis of a fundamental type of software    known as firmware has revealed poor security practices that    could present opportunities for hackers probing the Internet    of Things.  <\/p>\n<p>    Firmware is a type of software that manages interactions    between higher-level software and the underlying hardware,    though it can sometimes be the only software on a device. Its    found on all kinds of computer hardware, though the study    focused on embedded systems such as printers, routers and    security cameras.  <\/p>\n<p>    Researchers with Eurecom, a technology-focused    graduate school in France, developed a web crawler that plucked    more than 30,000 firmware images from the websites of    manufacturers including Siemens, Xerox, Bosch, Philips, D-Link,    Samsung, LG and Belkin.  <\/p>\n<p>    They    found a variety of security issues, including poorly-protected    encryption mechanisms and backdoors that could allow access to    devices. More than 123 products contained some of the 38    vulnerabilities they found, which they reported privately to    vendors.  <\/p>\n<p>    Theyre    due to present     their research next week at the 23rd Usenix Security    Symposium in San Diego.  <\/p>\n<p>    Most of    the firmware they analyzed is in consumer devices, a    competitive arena where companies often release products    quickly to stay ahead of rivals, said Aurlien Francillon[cq],    a coauthor of the study and an assistant professor in the    networking and security department at Eurecom.  <\/p>\n<p>    You    have to be first and cheap, Francillon said in a phone    interview. All of those things are what you should not do if    you want a secure device.  <\/p>\n<p>    Firmware security practices lag far behind those of the PC    software market, where vendors like Microsoft learned the hard    way that they need to patch software automatically on a    regular, frequent schedule.  <\/p>\n<p>    Thats    often not the case with firmware, which may not be designed to    patch itself periodically and also relies heavily on    third-party software that may not be current. In one instance,    the researchers found a Linux kernel that was 10 years out of    date bundled in a recently released firmware image.  <\/p>\n<p>    On    these devices, its a real nightmare, Francillon said.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continue reading here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pcworld.com\/article\/2464060\/study-finds-firmware-plagued-by-poor-encryption-and-backdoors.html\/RK=0\/RS=uKLWC84wCQXqPRnGbuWme9gUcG0-\" title=\"Study finds firmware plagued by poor encryption and backdoors\">Study finds firmware plagued by poor encryption and backdoors<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The first large-scale analysis of a fundamental type of software known as firmware has revealed poor security practices that could present opportunities for hackers probing the Internet of Things. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-25448","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25448"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25448"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25448\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25448"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25448"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}