International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 7 | Views: 89

Research Paper | Information Technology | India | Volume 10 Issue 5, May 2021


Performing Attacks on Radio Frequency and Embedded based Systems

Preeti Rana [2]


Abstract: With the increasing use of embedded devices in our daily life, security threats have also been increasing in a proportional rate. However, ensuring security in the embedded systems has become a great challenge not only for the embedded device experts but also for the manufacturers. The problem especially arises because of the limited hardware and software implementation options for the designers. At the same time, companies are trying to keep the vulnerabilities of the operating system of those embedded devices in secret and they are not relieving any necessary security updates quickly. It has become very urgent to ensure proper security of the embedded systems to save it from any major technological disaster near future. In this paper, I have broadly discussed on how to perform attack on embedded devices, So that you can be aware of embedded devices loopholes. Beside this, I have also discussed about the different causes of security threats so that you can protect the systems from the attackers.


Keywords: Hardware hacking, Firmware, Rf attacks, Attacking tools, hardware, software


Edition: Volume 10 Issue 5, May 2021,


Pages: 369 - 371


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top