Measuring the Security of IoT Devices
Schneier on Security
OCTOBER 3, 2019
In August, CyberITL completed a large-scale survey of software security practices in the IoT environment, by looking at the compiled software. They look at the actual firmware. MIPS is both the most common CPU architecture and least hardened on average. CyberITL's methodology is not source code analysis.
Let's personalize your content