Persona: Martín Gutiérrez, Sergio
Cargando...
Dirección de correo electrónico
ORCID
0000-0002-4118-0234
Fecha de nacimiento
Proyectos de investigación
Unidades organizativas
Puesto de trabajo
Apellidos
Martín Gutiérrez
Nombre de pila
Sergio
Nombre
2 resultados
Resultados de la búsqueda
Mostrando 1 - 2 de 2
Publicación Security management on Arduino-based electronic devices(IEEE Xplore, 2023-05-01) Jorge Sainz-Raso; Martín Gutiérrez, Sergio; Gabriel Diaz; Manuel Castro; https://orcid.org/0000-0001-8055-7463; https://orcid.org/0000-0001-9246-351X; https://orcid.org/0000-0003-3559-4235Arduino has arisen as a very popular element among the devices, platforms and communication protocols that make up the Internet of Things (IoT). This popularity has grown because it is low-cost and flexible device but with a huge potential for home-made or educational electronic projects. However, due to the low-cost requirement design, this device has some hardware limitations and vulnerabilities that must be carefully studied for each project. This article analyzes different software and hardware vulnerabilities that can be found in different version of Arduino boards. Finally, some good practices and recommendations are presented in order to mitigate presented vulnerabilities.Publicación Security vulnerabilities in Raspberry Pi. Analysis of hardware and software weaknesses(IEEE Xplore, 2019-11-01) Jorge Sainz-Raso; Martín Gutiérrez, Sergio; Díaz Orueta, Gabriel; Pancorbo Castro, ManuelThe Internet of Things (IoT) is made up of many devices, platforms, and communication protocols. Among them, Raspberry Pi has arisen as one of the most popular equipment for hobby and education purposes because of its low cost, small size, flexibility, and potential. Nevertheless, Raspberry Pi needs an operating system to work, which exposes it to software vulnerabilities despite the many advantages it provides in comparison with nonoperating system devices. This device also has hardware limitations, which impact on its security. These limitations exist because some concessions had to be done during the design in order to decrease the cost of the device. This article analyzes different hardware and software vulnerabilities that can be found in a Raspberry Pi when using a default installation of different available operating systems. Finally, we propose a list of good practices to minimize the presented issues.