Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Embedded System

Below you will find reports with the tag of “Embedded System”

image from Crossing The Last Mile Of IoT Security Cyber Risk

Crossing The Last Mile Of IoT Security Cyber Risk

This paper seeks to provide understanding and aid with meeting the unique information demands that the Internet of Things requires.

(more available)
Added: October 23, 2018
image from CENTRI 2017 Security Report Research And Roundtable

CENTRI 2017 Security Report Research And Roundtable

The purpose of this report is to look at some of the key security issues the industry is facing now in terms of what problems exist and possible solutions. It also looks at what’s being done, what’s not being done, and what should and could be done.

(more available)
Added: October 19, 2018
image from 2017 State of DevOps Report

2017 State of DevOps Report

This paper seeks to provide high level and tactical findings that are intended to help you advance the progress of your own DevOps Journey. Some key findings in this report are; the beneficial effects of DevOps go beyond financial results, automation is a key differentiator for organizations, and they delve deep into how an application’s architecture can affect an organization’s ability to develop and deliver software.

(more available)
Added: October 16, 2018
image from A Quick History Of IoT Botnets

A Quick History Of IoT Botnets

Here is a short report on the history of IoT Botnets.

Added: October 16, 2018
image from Cross-Protocol Request Forgery

Cross-Protocol Request Forgery

This whitepaper formalizes a class of attacks called Cross-Protocol Request Forgery (CPRF) which enables non-HTTP listeners to be exploited through Cross-Site Request Forgery (CSRF) and Server-Side Request Forgery (SSRF). This paper both references existing research and expands upon it in later sections.

(more available)
Added: October 15, 2018
image from Rooting A Logitech Harmony Hub:Improving Security In Today's IoT World

Rooting A Logitech Harmony Hub:Improving Security In Today's IoT World

This blog post takes a look at a vulnerability unique to the Logitech Harmony Hub.

Added: October 13, 2018
© Cyentia Institute 2025
Library updated: June 27, 2025 12:08 UTC (build b1d7be4)