Emanuela Bagnato
Attacco e difesa: Strategie di Sicurezza per Dispositivi Embedded Custom = From Attacks to Defense: Security Strategies for Custom Embedded Devices.
Rel. Alessandro Savino, Stefano Di Carlo. Politecnico di Torino, Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering), 2025
|
Preview |
PDF (Tesi_di_laurea)
- Tesi
Licenza: Creative Commons Attribution Non-commercial No Derivatives. Download (7MB) | Preview |
Abstract
Cybersecurity has become increasingly important and critical as the world grows more interconnected and the Internet of Things (IoT) establishes itself as a global reality. Today, most embedded devices operate as IoT components, making their protection a priority. Over time, several international standards have been developed to define best practices for cybersecurity in this field, and organizations are mostly required to comply with them. After an in-depth study of the principal standards and best practices, this thesis focus shifted on the analysis of vulnerabilities in a custom embedded device. Starting from a static vulnerability assessment, targeted tests were performed, and based on the results improvements were subsequently introduced to enhance the device’s security posture.
Particular attention was dedicated to the EN 18031-1 standard, which became a mandatory certification on August 1st of the current year, ensuring that the device was brought into full compliance with this standard
Relatori
Anno Accademico
Tipo di pubblicazione
Numero di pagine
Corso di laurea
Classe di laurea
Aziende collaboratrici
URI
![]() |
Modifica (riservato agli operatori) |
