Affiliation:
1. Faculty of Sciences, Moulay Ismail University of Meknes, Morocco
Abstract
The security of embedded systems is deteriorating in comparison to conventional systems due to resource limitations in memory, processing, and power. Daily publications highlight various vulnerabilities associated with these systems. While significant efforts have been made to systematize and analyze these vulnerabilities, most studies focus on specific areas within embedded systems and lack the implementation of artificial intelligence (AI). This research aims to address these gaps by utilizing support vector machine (SVM) to classify vulnerabilities sourced from the national vulnerabilities database (NVD) and specifically targeting embedded system vulnerabilities. Results indicate that seven of the top 10 common weakness enumeration (CWE) vulnerabilities in embedded systems are also present in the 2022 CWE Top 25 Most Dangerous Software Weaknesses. The findings of this study will facilitate security researchers and companies in comprehensively analyzing embedded system vulnerabilities and developing tailored solutions.
Reference21 articles.
1. CVE Based Classification of Vulnerable IoT Systems
2. An automatic software vulnerability classification framework using term frequency-inverse gravity moment and feature selection
3. Connected Cars Technology Vulnerable to Cyber Attacks. (n.d.). Trend Micro | Newsroom. Retrieved November 4, 2023, from https://newsroom.trendmicro.com/2021-02-16-Connected-Cars-Technology-Vulnerable-to-Cyber-Attacks
4. Critical traffic light system vulnerability could cause ‘chaos’ on the roads. (2020, June 9). The Daily Swig | Cybersecurity News and Views. https://portswigger.net/daily-swig/critical-traffic-light-system-vulnerability-could-cause-chaos-on-the-roads
5. Intelligent Car with Voice Assistance and Obstacle Detector to Aid the Disabled