Embedded Device Hacking
Formal
The exploiting of vulnerabilities in embedded software to gain control of the device. Embedded systems exist in a wide variety of devices including Internet and wireless access points, IP cameras, security systems, drones, and industrial control systems.
Practical
Attackers have hacked embedded systems to spy on the devices, to take control of them or simply to disable (brick) them. Embedded systems exist in a wide variety of devices including Internet and wireless access points, IP cameras, security systems, pace makers, drones and industrial control systems.