<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Yunsoul</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Yunsoul"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Yunsoul"/>
		<updated>2026-04-29T19:17:27Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Robot_Security_Project&amp;diff=226447</id>
		<title>OWASP Robot Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Robot_Security_Project&amp;diff=226447"/>
				<updated>2017-02-17T07:48:38Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: /* Project About */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The OWASP Security Principles==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Inevitably applications are designed with security principles architects knew about, security folks included. However, as this project demonstrates there are far more than just a 'few' principles, most of which never make it into the design.&lt;br /&gt;
&lt;br /&gt;
For example, security design happens with perhaps a handful of principles:&lt;br /&gt;
&lt;br /&gt;
* Least Privilege&lt;br /&gt;
* Perimeter Security&lt;br /&gt;
* Defence in Depth&lt;br /&gt;
&lt;br /&gt;
However, we regularly see designs without '''separation of privilege'''!&lt;br /&gt;
&lt;br /&gt;
Think about that, most web applications today have all their eggs in a single basket. The business logic, the identities, passwords, products, policy enforcement, security rules are all found in the same application database that makes up the typical website! It is little wonder then, that attacks on the database have been so completely devastating, since there is no separation of privilege!&lt;br /&gt;
&lt;br /&gt;
The aim of this project, is to identify and describe a minimum functional set of principles that must be present in a secure design.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Although this is a sample template, the project is real! [http://owasp.github.io/Security-Principles Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
Over the course of my career, I have come across and collected a number of security ''aphorisms.'' These aphorisms constitute the fundamental principles of information security.&lt;br /&gt;
&lt;br /&gt;
None of the ideas or truths are mine, and unfortunately, I did not collect the citations. Initially, I would like to identify the correct citations for each aphorism.&lt;br /&gt;
&lt;br /&gt;
Additionally, many are re-statements of the same idea; thus, the 'collection of ideas' defines a fundamental principle. As such, I would also like to reverse engineer the principles from the aphorisms where appropriate, as well.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact it is encouraged!!!&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important?&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The end goal is to identify, cite, and document the fundamental principles of information security. Once this is well organised, I think it would be great to publish this through the [http://scriptogr.am/dennis-groves/post/owasp-press OWASP Press]. Of course, it will always remain freely available, and any money collected will go directly into the project to absorb costs with any remaining funds going to the OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
This document should serve as a guide to technical architects and designers outlining the fundamental principles of security.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to slide presentations related to your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
AppSec USA 2013 [https://github.com/OWASP/Security-Principles/tree/master/Presentations/AppSec%20NYC%202013]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to your repository.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you place links to where your project product can be downloaded or purchased, in the case of a book. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
===Define Robot's Security Area===&lt;br /&gt;
* define a robot&lt;br /&gt;
* define robot's security layer&lt;br /&gt;
* define attack surface&lt;br /&gt;
* define attack vector&lt;br /&gt;
* make threat modeling&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Make a Security Guideline(interface, communication, authentication, etc)===&lt;br /&gt;
* define countermeasures of attack vector&lt;br /&gt;
* define robot's identification spec. and methods&lt;br /&gt;
* guideline for robot hardware/sensor development&lt;br /&gt;
* guideline for external interface of robot&lt;br /&gt;
* guideline for software development&lt;br /&gt;
* guideline for robot OS&lt;br /&gt;
* guideline for robot's communication/transport layer&lt;br /&gt;
* guideline for robot's (dynamic) authentication&lt;br /&gt;
* guideline for robot's cloud layer&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}} &lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Robot_Security_Project}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Robot_Security_Project&amp;diff=226446</id>
		<title>OWASP Robot Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Robot_Security_Project&amp;diff=226446"/>
				<updated>2017-02-17T07:44:51Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: Undo revision 226445 by Yunsoul (talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The OWASP Security Principles==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Inevitably applications are designed with security principles architects knew about, security folks included. However, as this project demonstrates there are far more than just a 'few' principles, most of which never make it into the design.&lt;br /&gt;
&lt;br /&gt;
For example, security design happens with perhaps a handful of principles:&lt;br /&gt;
&lt;br /&gt;
* Least Privilege&lt;br /&gt;
* Perimeter Security&lt;br /&gt;
* Defence in Depth&lt;br /&gt;
&lt;br /&gt;
However, we regularly see designs without '''separation of privilege'''!&lt;br /&gt;
&lt;br /&gt;
Think about that, most web applications today have all their eggs in a single basket. The business logic, the identities, passwords, products, policy enforcement, security rules are all found in the same application database that makes up the typical website! It is little wonder then, that attacks on the database have been so completely devastating, since there is no separation of privilege!&lt;br /&gt;
&lt;br /&gt;
The aim of this project, is to identify and describe a minimum functional set of principles that must be present in a secure design.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Although this is a sample template, the project is real! [http://owasp.github.io/Security-Principles Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
Over the course of my career, I have come across and collected a number of security ''aphorisms.'' These aphorisms constitute the fundamental principles of information security.&lt;br /&gt;
&lt;br /&gt;
None of the ideas or truths are mine, and unfortunately, I did not collect the citations. Initially, I would like to identify the correct citations for each aphorism.&lt;br /&gt;
&lt;br /&gt;
Additionally, many are re-statements of the same idea; thus, the 'collection of ideas' defines a fundamental principle. As such, I would also like to reverse engineer the principles from the aphorisms where appropriate, as well.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact it is encouraged!!!&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important?&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The end goal is to identify, cite, and document the fundamental principles of information security. Once this is well organised, I think it would be great to publish this through the [http://scriptogr.am/dennis-groves/post/owasp-press OWASP Press]. Of course, it will always remain freely available, and any money collected will go directly into the project to absorb costs with any remaining funds going to the OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
This document should serve as a guide to technical architects and designers outlining the fundamental principles of security.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to slide presentations related to your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
AppSec USA 2013 [https://github.com/OWASP/Security-Principles/tree/master/Presentations/AppSec%20NYC%202013]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to your repository.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you place links to where your project product can be downloaded or purchased, in the case of a book. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
===Define Robot's Security Area===&lt;br /&gt;
* define a robot&lt;br /&gt;
* define robot's security layer&lt;br /&gt;
* define attack surface&lt;br /&gt;
* define attack vector&lt;br /&gt;
* make threat modeling&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Make a Security Guideline(interface, communication, authentication, etc)===&lt;br /&gt;
* define countermeasures of attack vector&lt;br /&gt;
* define robot's identification spec. and methods&lt;br /&gt;
* guideline for robot hardware/sensor development&lt;br /&gt;
* guideline for external interface of robot&lt;br /&gt;
* guideline for software development&lt;br /&gt;
* guideline for robot OS&lt;br /&gt;
* guideline for robot's communication/transport layer&lt;br /&gt;
* guideline for robot's (dynamic) authentication&lt;br /&gt;
* guideline for robot's cloud layer&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Robot_Security_Project&amp;diff=226445</id>
		<title>OWASP Robot Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Robot_Security_Project&amp;diff=226445"/>
				<updated>2017-02-17T07:43:47Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: /* Project About */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The OWASP Security Principles==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Inevitably applications are designed with security principles architects knew about, security folks included. However, as this project demonstrates there are far more than just a 'few' principles, most of which never make it into the design.&lt;br /&gt;
&lt;br /&gt;
For example, security design happens with perhaps a handful of principles:&lt;br /&gt;
&lt;br /&gt;
* Least Privilege&lt;br /&gt;
* Perimeter Security&lt;br /&gt;
* Defence in Depth&lt;br /&gt;
&lt;br /&gt;
However, we regularly see designs without '''separation of privilege'''!&lt;br /&gt;
&lt;br /&gt;
Think about that, most web applications today have all their eggs in a single basket. The business logic, the identities, passwords, products, policy enforcement, security rules are all found in the same application database that makes up the typical website! It is little wonder then, that attacks on the database have been so completely devastating, since there is no separation of privilege!&lt;br /&gt;
&lt;br /&gt;
The aim of this project, is to identify and describe a minimum functional set of principles that must be present in a secure design.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Although this is a sample template, the project is real! [http://owasp.github.io/Security-Principles Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
Over the course of my career, I have come across and collected a number of security ''aphorisms.'' These aphorisms constitute the fundamental principles of information security.&lt;br /&gt;
&lt;br /&gt;
None of the ideas or truths are mine, and unfortunately, I did not collect the citations. Initially, I would like to identify the correct citations for each aphorism.&lt;br /&gt;
&lt;br /&gt;
Additionally, many are re-statements of the same idea; thus, the 'collection of ideas' defines a fundamental principle. As such, I would also like to reverse engineer the principles from the aphorisms where appropriate, as well.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact it is encouraged!!!&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important?&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The end goal is to identify, cite, and document the fundamental principles of information security. Once this is well organised, I think it would be great to publish this through the [http://scriptogr.am/dennis-groves/post/owasp-press OWASP Press]. Of course, it will always remain freely available, and any money collected will go directly into the project to absorb costs with any remaining funds going to the OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
This document should serve as a guide to technical architects and designers outlining the fundamental principles of security.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to slide presentations related to your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
AppSec USA 2013 [https://github.com/OWASP/Security-Principles/tree/master/Presentations/AppSec%20NYC%202013]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to your repository.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you place links to where your project product can be downloaded or purchased, in the case of a book. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
===Define Robot's Security Area===&lt;br /&gt;
* define a robot&lt;br /&gt;
* define robot's security layer&lt;br /&gt;
* define attack surface&lt;br /&gt;
* define attack vector&lt;br /&gt;
* make threat modeling&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Make a Security Guideline(interface, communication, authentication, etc)===&lt;br /&gt;
* define countermeasures of attack vector&lt;br /&gt;
* define robot's identification spec. and methods&lt;br /&gt;
* guideline for robot hardware/sensor development&lt;br /&gt;
* guideline for external interface of robot&lt;br /&gt;
* guideline for software development&lt;br /&gt;
* guideline for robot OS&lt;br /&gt;
* guideline for robot's communication/transport layer&lt;br /&gt;
* guideline for robot's (dynamic) authentication&lt;br /&gt;
* guideline for robot's cloud layer&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/OWASP_Robot_Security_Project&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Robot_Security_Project&amp;diff=226443</id>
		<title>OWASP Robot Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Robot_Security_Project&amp;diff=226443"/>
				<updated>2017-02-17T07:40:34Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: /* Project About */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The OWASP Security Principles==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Inevitably applications are designed with security principles architects knew about, security folks included. However, as this project demonstrates there are far more than just a 'few' principles, most of which never make it into the design.&lt;br /&gt;
&lt;br /&gt;
For example, security design happens with perhaps a handful of principles:&lt;br /&gt;
&lt;br /&gt;
* Least Privilege&lt;br /&gt;
* Perimeter Security&lt;br /&gt;
* Defence in Depth&lt;br /&gt;
&lt;br /&gt;
However, we regularly see designs without '''separation of privilege'''!&lt;br /&gt;
&lt;br /&gt;
Think about that, most web applications today have all their eggs in a single basket. The business logic, the identities, passwords, products, policy enforcement, security rules are all found in the same application database that makes up the typical website! It is little wonder then, that attacks on the database have been so completely devastating, since there is no separation of privilege!&lt;br /&gt;
&lt;br /&gt;
The aim of this project, is to identify and describe a minimum functional set of principles that must be present in a secure design.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Although this is a sample template, the project is real! [http://owasp.github.io/Security-Principles Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
Over the course of my career, I have come across and collected a number of security ''aphorisms.'' These aphorisms constitute the fundamental principles of information security.&lt;br /&gt;
&lt;br /&gt;
None of the ideas or truths are mine, and unfortunately, I did not collect the citations. Initially, I would like to identify the correct citations for each aphorism.&lt;br /&gt;
&lt;br /&gt;
Additionally, many are re-statements of the same idea; thus, the 'collection of ideas' defines a fundamental principle. As such, I would also like to reverse engineer the principles from the aphorisms where appropriate, as well.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact it is encouraged!!!&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important?&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The end goal is to identify, cite, and document the fundamental principles of information security. Once this is well organised, I think it would be great to publish this through the [http://scriptogr.am/dennis-groves/post/owasp-press OWASP Press]. Of course, it will always remain freely available, and any money collected will go directly into the project to absorb costs with any remaining funds going to the OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
This document should serve as a guide to technical architects and designers outlining the fundamental principles of security.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to slide presentations related to your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
AppSec USA 2013 [https://github.com/OWASP/Security-Principles/tree/master/Presentations/AppSec%20NYC%202013]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to your repository.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you place links to where your project product can be downloaded or purchased, in the case of a book. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
===Define Robot's Security Area===&lt;br /&gt;
* define a robot&lt;br /&gt;
* define robot's security layer&lt;br /&gt;
* define attack surface&lt;br /&gt;
* define attack vector&lt;br /&gt;
* make threat modeling&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Make a Security Guideline(interface, communication, authentication, etc)===&lt;br /&gt;
* define countermeasures of attack vector&lt;br /&gt;
* define robot's identification spec. and methods&lt;br /&gt;
* guideline for robot hardware/sensor development&lt;br /&gt;
* guideline for external interface of robot&lt;br /&gt;
* guideline for software development&lt;br /&gt;
* guideline for robot OS&lt;br /&gt;
* guideline for robot's communication/transport layer&lt;br /&gt;
* guideline for robot's (dynamic) authentication&lt;br /&gt;
* guideline for robot's cloud layer&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Robot_Security_Project&amp;diff=226442</id>
		<title>OWASP Robot Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Robot_Security_Project&amp;diff=226442"/>
				<updated>2017-02-17T07:40:03Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: /* Project About */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The OWASP Security Principles==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Inevitably applications are designed with security principles architects knew about, security folks included. However, as this project demonstrates there are far more than just a 'few' principles, most of which never make it into the design.&lt;br /&gt;
&lt;br /&gt;
For example, security design happens with perhaps a handful of principles:&lt;br /&gt;
&lt;br /&gt;
* Least Privilege&lt;br /&gt;
* Perimeter Security&lt;br /&gt;
* Defence in Depth&lt;br /&gt;
&lt;br /&gt;
However, we regularly see designs without '''separation of privilege'''!&lt;br /&gt;
&lt;br /&gt;
Think about that, most web applications today have all their eggs in a single basket. The business logic, the identities, passwords, products, policy enforcement, security rules are all found in the same application database that makes up the typical website! It is little wonder then, that attacks on the database have been so completely devastating, since there is no separation of privilege!&lt;br /&gt;
&lt;br /&gt;
The aim of this project, is to identify and describe a minimum functional set of principles that must be present in a secure design.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Although this is a sample template, the project is real! [http://owasp.github.io/Security-Principles Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
Over the course of my career, I have come across and collected a number of security ''aphorisms.'' These aphorisms constitute the fundamental principles of information security.&lt;br /&gt;
&lt;br /&gt;
None of the ideas or truths are mine, and unfortunately, I did not collect the citations. Initially, I would like to identify the correct citations for each aphorism.&lt;br /&gt;
&lt;br /&gt;
Additionally, many are re-statements of the same idea; thus, the 'collection of ideas' defines a fundamental principle. As such, I would also like to reverse engineer the principles from the aphorisms where appropriate, as well.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact it is encouraged!!!&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important?&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The end goal is to identify, cite, and document the fundamental principles of information security. Once this is well organised, I think it would be great to publish this through the [http://scriptogr.am/dennis-groves/post/owasp-press OWASP Press]. Of course, it will always remain freely available, and any money collected will go directly into the project to absorb costs with any remaining funds going to the OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
This document should serve as a guide to technical architects and designers outlining the fundamental principles of security.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to slide presentations related to your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
AppSec USA 2013 [https://github.com/OWASP/Security-Principles/tree/master/Presentations/AppSec%20NYC%202013]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to your repository.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you place links to where your project product can be downloaded or purchased, in the case of a book. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
===Define Robot's Security Area===&lt;br /&gt;
* define a robot&lt;br /&gt;
* define robot's security layer&lt;br /&gt;
* define attack surface&lt;br /&gt;
* define attack vector&lt;br /&gt;
* make threat modeling&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Make a Security Guideline(interface, communication, authentication, etc)===&lt;br /&gt;
* define countermeasures of attack vector&lt;br /&gt;
* define robot's identification spec. and methods&lt;br /&gt;
* guideline for robot hardware/sensor development&lt;br /&gt;
* guideline for external interface of robot&lt;br /&gt;
* guideline for software development&lt;br /&gt;
* guideline for robot OS&lt;br /&gt;
* guideline for robot's communication/transport layer&lt;br /&gt;
* guideline for robot's (dynamic) authentication&lt;br /&gt;
* guideline for robot's cloud layer&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Robot_Security_Project&amp;diff=226441</id>
		<title>OWASP Robot Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Robot_Security_Project&amp;diff=226441"/>
				<updated>2017-02-17T07:38:37Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: Undo revision 226440 by Yunsoul (talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The OWASP Security Principles==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Inevitably applications are designed with security principles architects knew about, security folks included. However, as this project demonstrates there are far more than just a 'few' principles, most of which never make it into the design.&lt;br /&gt;
&lt;br /&gt;
For example, security design happens with perhaps a handful of principles:&lt;br /&gt;
&lt;br /&gt;
* Least Privilege&lt;br /&gt;
* Perimeter Security&lt;br /&gt;
* Defence in Depth&lt;br /&gt;
&lt;br /&gt;
However, we regularly see designs without '''separation of privilege'''!&lt;br /&gt;
&lt;br /&gt;
Think about that, most web applications today have all their eggs in a single basket. The business logic, the identities, passwords, products, policy enforcement, security rules are all found in the same application database that makes up the typical website! It is little wonder then, that attacks on the database have been so completely devastating, since there is no separation of privilege!&lt;br /&gt;
&lt;br /&gt;
The aim of this project, is to identify and describe a minimum functional set of principles that must be present in a secure design.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Although this is a sample template, the project is real! [http://owasp.github.io/Security-Principles Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
Over the course of my career, I have come across and collected a number of security ''aphorisms.'' These aphorisms constitute the fundamental principles of information security.&lt;br /&gt;
&lt;br /&gt;
None of the ideas or truths are mine, and unfortunately, I did not collect the citations. Initially, I would like to identify the correct citations for each aphorism.&lt;br /&gt;
&lt;br /&gt;
Additionally, many are re-statements of the same idea; thus, the 'collection of ideas' defines a fundamental principle. As such, I would also like to reverse engineer the principles from the aphorisms where appropriate, as well.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact it is encouraged!!!&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important?&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The end goal is to identify, cite, and document the fundamental principles of information security. Once this is well organised, I think it would be great to publish this through the [http://scriptogr.am/dennis-groves/post/owasp-press OWASP Press]. Of course, it will always remain freely available, and any money collected will go directly into the project to absorb costs with any remaining funds going to the OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
This document should serve as a guide to technical architects and designers outlining the fundamental principles of security.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to slide presentations related to your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
AppSec USA 2013 [https://github.com/OWASP/Security-Principles/tree/master/Presentations/AppSec%20NYC%202013]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to your repository.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you place links to where your project product can be downloaded or purchased, in the case of a book. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
===Define Robot's Security Area===&lt;br /&gt;
* define a robot&lt;br /&gt;
* define robot's security layer&lt;br /&gt;
* define attack surface&lt;br /&gt;
* define attack vector&lt;br /&gt;
* make threat modeling&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Make a Security Guideline(interface, communication, authentication, etc)===&lt;br /&gt;
* define countermeasures of attack vector&lt;br /&gt;
* define robot's identification spec. and methods&lt;br /&gt;
* guideline for robot hardware/sensor development&lt;br /&gt;
* guideline for external interface of robot&lt;br /&gt;
* guideline for software development&lt;br /&gt;
* guideline for robot OS&lt;br /&gt;
* guideline for robot's communication/transport layer&lt;br /&gt;
* guideline for robot's (dynamic) authentication&lt;br /&gt;
* guideline for robot's cloud layer&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Robot_Security_Project&amp;diff=226440</id>
		<title>OWASP Robot Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Robot_Security_Project&amp;diff=226440"/>
				<updated>2017-02-17T07:27:10Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: /* Project About */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The OWASP Security Principles==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Inevitably applications are designed with security principles architects knew about, security folks included. However, as this project demonstrates there are far more than just a 'few' principles, most of which never make it into the design.&lt;br /&gt;
&lt;br /&gt;
For example, security design happens with perhaps a handful of principles:&lt;br /&gt;
&lt;br /&gt;
* Least Privilege&lt;br /&gt;
* Perimeter Security&lt;br /&gt;
* Defence in Depth&lt;br /&gt;
&lt;br /&gt;
However, we regularly see designs without '''separation of privilege'''!&lt;br /&gt;
&lt;br /&gt;
Think about that, most web applications today have all their eggs in a single basket. The business logic, the identities, passwords, products, policy enforcement, security rules are all found in the same application database that makes up the typical website! It is little wonder then, that attacks on the database have been so completely devastating, since there is no separation of privilege!&lt;br /&gt;
&lt;br /&gt;
The aim of this project, is to identify and describe a minimum functional set of principles that must be present in a secure design.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Although this is a sample template, the project is real! [http://owasp.github.io/Security-Principles Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
Over the course of my career, I have come across and collected a number of security ''aphorisms.'' These aphorisms constitute the fundamental principles of information security.&lt;br /&gt;
&lt;br /&gt;
None of the ideas or truths are mine, and unfortunately, I did not collect the citations. Initially, I would like to identify the correct citations for each aphorism.&lt;br /&gt;
&lt;br /&gt;
Additionally, many are re-statements of the same idea; thus, the 'collection of ideas' defines a fundamental principle. As such, I would also like to reverse engineer the principles from the aphorisms where appropriate, as well.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact it is encouraged!!!&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important?&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The end goal is to identify, cite, and document the fundamental principles of information security. Once this is well organised, I think it would be great to publish this through the [http://scriptogr.am/dennis-groves/post/owasp-press OWASP Press]. Of course, it will always remain freely available, and any money collected will go directly into the project to absorb costs with any remaining funds going to the OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
This document should serve as a guide to technical architects and designers outlining the fundamental principles of security.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to slide presentations related to your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
AppSec USA 2013 [https://github.com/OWASP/Security-Principles/tree/master/Presentations/AppSec%20NYC%202013]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to your repository.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you place links to where your project product can be downloaded or purchased, in the case of a book. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
===Define Robot's Security Area===&lt;br /&gt;
* define a robot&lt;br /&gt;
* define robot's security layer&lt;br /&gt;
* define attack surface&lt;br /&gt;
* define attack vector&lt;br /&gt;
* make threat modeling&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Make a Security Guideline(interface, communication, authentication, etc)===&lt;br /&gt;
* define countermeasures of attack vector&lt;br /&gt;
* define robot's identification spec. and methods&lt;br /&gt;
* guideline for robot hardware/sensor development&lt;br /&gt;
* guideline for external interface of robot&lt;br /&gt;
* guideline for software development&lt;br /&gt;
* guideline for robot OS&lt;br /&gt;
* guideline for robot's communication/transport layer&lt;br /&gt;
* guideline for robot's (dynamic) authentication&lt;br /&gt;
* guideline for robot's cloud layer&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Robot_Security_Project&amp;diff=226439</id>
		<title>OWASP Robot Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Robot_Security_Project&amp;diff=226439"/>
				<updated>2017-02-17T07:26:08Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The OWASP Security Principles==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Inevitably applications are designed with security principles architects knew about, security folks included. However, as this project demonstrates there are far more than just a 'few' principles, most of which never make it into the design.&lt;br /&gt;
&lt;br /&gt;
For example, security design happens with perhaps a handful of principles:&lt;br /&gt;
&lt;br /&gt;
* Least Privilege&lt;br /&gt;
* Perimeter Security&lt;br /&gt;
* Defence in Depth&lt;br /&gt;
&lt;br /&gt;
However, we regularly see designs without '''separation of privilege'''!&lt;br /&gt;
&lt;br /&gt;
Think about that, most web applications today have all their eggs in a single basket. The business logic, the identities, passwords, products, policy enforcement, security rules are all found in the same application database that makes up the typical website! It is little wonder then, that attacks on the database have been so completely devastating, since there is no separation of privilege!&lt;br /&gt;
&lt;br /&gt;
The aim of this project, is to identify and describe a minimum functional set of principles that must be present in a secure design.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Although this is a sample template, the project is real! [http://owasp.github.io/Security-Principles Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
Over the course of my career, I have come across and collected a number of security ''aphorisms.'' These aphorisms constitute the fundamental principles of information security.&lt;br /&gt;
&lt;br /&gt;
None of the ideas or truths are mine, and unfortunately, I did not collect the citations. Initially, I would like to identify the correct citations for each aphorism.&lt;br /&gt;
&lt;br /&gt;
Additionally, many are re-statements of the same idea; thus, the 'collection of ideas' defines a fundamental principle. As such, I would also like to reverse engineer the principles from the aphorisms where appropriate, as well.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact it is encouraged!!!&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important?&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The end goal is to identify, cite, and document the fundamental principles of information security. Once this is well organised, I think it would be great to publish this through the [http://scriptogr.am/dennis-groves/post/owasp-press OWASP Press]. Of course, it will always remain freely available, and any money collected will go directly into the project to absorb costs with any remaining funds going to the OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
This document should serve as a guide to technical architects and designers outlining the fundamental principles of security.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to slide presentations related to your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
AppSec USA 2013 [https://github.com/OWASP/Security-Principles/tree/master/Presentations/AppSec%20NYC%202013]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to your repository.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you place links to where your project product can be downloaded or purchased, in the case of a book. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
===Define Robot's Security Area===&lt;br /&gt;
* define a robot&lt;br /&gt;
* define robot's security layer&lt;br /&gt;
* define attack surface&lt;br /&gt;
* define attack vector&lt;br /&gt;
* make threat modeling&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Make a Security Guideline(interface, communication, authentication, etc)===&lt;br /&gt;
* define countermeasures of attack vector&lt;br /&gt;
* define robot's identification spec. and methods&lt;br /&gt;
* guideline for robot hardware/sensor development&lt;br /&gt;
* guideline for external interface of robot&lt;br /&gt;
* guideline for software development&lt;br /&gt;
* guideline for robot OS&lt;br /&gt;
* guideline for robot's communication/transport layer&lt;br /&gt;
* guideline for robot's (dynamic) authentication&lt;br /&gt;
* guideline for robot's cloud layer&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Robot_Security_Project&amp;diff=226438</id>
		<title>OWASP Robot Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Robot_Security_Project&amp;diff=226438"/>
				<updated>2017-02-17T07:09:08Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: /* Acknowledgements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The OWASP Security Principles==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Inevitably applications are designed with security principles architects knew about, security folks included. However, as this project demonstrates there are far more than just a 'few' principles, most of which never make it into the design.&lt;br /&gt;
&lt;br /&gt;
For example, security design happens with perhaps a handful of principles:&lt;br /&gt;
&lt;br /&gt;
* Least Privilege&lt;br /&gt;
* Perimeter Security&lt;br /&gt;
* Defence in Depth&lt;br /&gt;
&lt;br /&gt;
However, we regularly see designs without '''separation of privilege'''!&lt;br /&gt;
&lt;br /&gt;
Think about that, most web applications today have all their eggs in a single basket. The business logic, the identities, passwords, products, policy enforcement, security rules are all found in the same application database that makes up the typical website! It is little wonder then, that attacks on the database have been so completely devastating, since there is no separation of privilege!&lt;br /&gt;
&lt;br /&gt;
The aim of this project, is to identify and describe a minimum functional set of principles that must be present in a secure design.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Although this is a sample template, the project is real! [http://owasp.github.io/Security-Principles Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
Over the course of my career, I have come across and collected a number of security ''aphorisms.'' These aphorisms constitute the fundamental principles of information security.&lt;br /&gt;
&lt;br /&gt;
None of the ideas or truths are mine, and unfortunately, I did not collect the citations. Initially, I would like to identify the correct citations for each aphorism.&lt;br /&gt;
&lt;br /&gt;
Additionally, many are re-statements of the same idea; thus, the 'collection of ideas' defines a fundamental principle. As such, I would also like to reverse engineer the principles from the aphorisms where appropriate, as well.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact it is encouraged!!!&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important?&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The end goal is to identify, cite, and document the fundamental principles of information security. Once this is well organised, I think it would be great to publish this through the [http://scriptogr.am/dennis-groves/post/owasp-press OWASP Press]. Of course, it will always remain freely available, and any money collected will go directly into the project to absorb costs with any remaining funds going to the OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
This document should serve as a guide to technical architects and designers outlining the fundamental principles of security.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to slide presentations related to your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
AppSec USA 2013 [https://github.com/OWASP/Security-Principles/tree/master/Presentations/AppSec%20NYC%202013]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to your repository.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you place links to where your project product can be downloaded or purchased, in the case of a book. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
* define robot's security area&lt;br /&gt;
* define attack surface&lt;br /&gt;
* define attack vector&lt;br /&gt;
* make threat modeling&lt;br /&gt;
* make a guideline(interface, communication, authentication, etc)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.&lt;br /&gt;
&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Roadmaps vary in detail from a broad outline to a fully detailed project charter. Generally speaking, projects with detailed roadmaps have tended to develop into successful projects. Some details that leaders may consider placing in the roadmap include: envisioned milestones, planned feature enhancements, essential conditions, project assumptions, development timelines, etc. You are required to have at least 4 milestones for every year the project is active. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As of October 2013, the priorities are:&lt;br /&gt;
* Finish the referencing for each principle.&lt;br /&gt;
* Update the Project Template.&lt;br /&gt;
* Use the OWASP Press to develop a book.&lt;br /&gt;
* Finish and publish the book on Lulu.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Principles Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Robot_Security_Project&amp;diff=226437</id>
		<title>OWASP Robot Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Robot_Security_Project&amp;diff=226437"/>
				<updated>2017-02-17T07:03:03Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The OWASP Security Principles==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Inevitably applications are designed with security principles architects knew about, security folks included. However, as this project demonstrates there are far more than just a 'few' principles, most of which never make it into the design.&lt;br /&gt;
&lt;br /&gt;
For example, security design happens with perhaps a handful of principles:&lt;br /&gt;
&lt;br /&gt;
* Least Privilege&lt;br /&gt;
* Perimeter Security&lt;br /&gt;
* Defence in Depth&lt;br /&gt;
&lt;br /&gt;
However, we regularly see designs without '''separation of privilege'''!&lt;br /&gt;
&lt;br /&gt;
Think about that, most web applications today have all their eggs in a single basket. The business logic, the identities, passwords, products, policy enforcement, security rules are all found in the same application database that makes up the typical website! It is little wonder then, that attacks on the database have been so completely devastating, since there is no separation of privilege!&lt;br /&gt;
&lt;br /&gt;
The aim of this project, is to identify and describe a minimum functional set of principles that must be present in a secure design.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Although this is a sample template, the project is real! [http://owasp.github.io/Security-Principles Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
Over the course of my career, I have come across and collected a number of security ''aphorisms.'' These aphorisms constitute the fundamental principles of information security.&lt;br /&gt;
&lt;br /&gt;
None of the ideas or truths are mine, and unfortunately, I did not collect the citations. Initially, I would like to identify the correct citations for each aphorism.&lt;br /&gt;
&lt;br /&gt;
Additionally, many are re-statements of the same idea; thus, the 'collection of ideas' defines a fundamental principle. As such, I would also like to reverse engineer the principles from the aphorisms where appropriate, as well.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact it is encouraged!!!&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important?&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The end goal is to identify, cite, and document the fundamental principles of information security. Once this is well organised, I think it would be great to publish this through the [http://scriptogr.am/dennis-groves/post/owasp-press OWASP Press]. Of course, it will always remain freely available, and any money collected will go directly into the project to absorb costs with any remaining funds going to the OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
This document should serve as a guide to technical architects and designers outlining the fundamental principles of security.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to slide presentations related to your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
AppSec USA 2013 [https://github.com/OWASP/Security-Principles/tree/master/Presentations/AppSec%20NYC%202013]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to your repository.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you place links to where your project product can be downloaded or purchased, in the case of a book. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
* [https://github.com/sublimino Andrew Martin]&lt;br /&gt;
* [https://github.com/Lambdanaut Josh Thomas]&lt;br /&gt;
* '''YOUR NAME BELONGS HERE'''&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
* define robot's security area&lt;br /&gt;
* define attack surface&lt;br /&gt;
* define attack vector&lt;br /&gt;
* make threat modeling&lt;br /&gt;
* make a guideline(interface, communication, authentication, etc)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.&lt;br /&gt;
&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Roadmaps vary in detail from a broad outline to a fully detailed project charter. Generally speaking, projects with detailed roadmaps have tended to develop into successful projects. Some details that leaders may consider placing in the roadmap include: envisioned milestones, planned feature enhancements, essential conditions, project assumptions, development timelines, etc. You are required to have at least 4 milestones for every year the project is active. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As of October 2013, the priorities are:&lt;br /&gt;
* Finish the referencing for each principle.&lt;br /&gt;
* Update the Project Template.&lt;br /&gt;
* Use the OWASP Press to develop a book.&lt;br /&gt;
* Finish and publish the book on Lulu.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Principles Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Yunsoul&amp;diff=226436</id>
		<title>User:Yunsoul</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Yunsoul&amp;diff=226436"/>
				<updated>2017-02-17T07:01:43Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Security Engineer&lt;br /&gt;
 * ...................................................................................................&lt;br /&gt;
 * &lt;br /&gt;
 * My Project : [https://owasp.org/index.php/OWASP_Robot_Security_Project OWASP Robot Security Project]&lt;br /&gt;
 * Contribute to : [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project OWASP Internet of Things Project]&lt;br /&gt;
 * &lt;br /&gt;
 * reverse engineering (x86, ARM, bytecode)&lt;br /&gt;
 * IoT(Internet of Things) security&lt;br /&gt;
 * anti-virus (anti-virus engine for pc and mobile)&lt;br /&gt;
 * mobile security (mobile app security, mobile game security)&lt;br /&gt;
 * malware analysis&lt;br /&gt;
 * system programming&lt;br /&gt;
 * windows kernel driver&lt;br /&gt;
 * interested in distributed(non-central)communication &amp;amp; athentication(authentication without trust) system&lt;br /&gt;
 * like rock (heavy metal) &amp;amp; hip-hop music&lt;br /&gt;
 * like scribbling anything&lt;br /&gt;
 * learning Haskell&lt;br /&gt;
 * and my mind&lt;br /&gt;
 * [mailto:happyme9@naver.com happyme9@naver.com]&lt;br /&gt;
 * ...................................................................................................&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Yunsoul&amp;diff=226435</id>
		<title>User:Yunsoul</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Yunsoul&amp;diff=226435"/>
				<updated>2017-02-17T07:00:35Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Security Engineer&lt;br /&gt;
 * ...................................................................................................&lt;br /&gt;
 * &lt;br /&gt;
 * My Project : [https://owasp.org/index.php/OWASP_Robot_Security_Project OWASP Robot Security Project]&lt;br /&gt;
 * &lt;br /&gt;
 * reverse engineering (x86, ARM, bytecode)&lt;br /&gt;
 * IoT(Internet of Things) security&lt;br /&gt;
 * anti-virus (anti-virus engine for pc and mobile)&lt;br /&gt;
 * mobile security (mobile app security, mobile game security)&lt;br /&gt;
 * malware analysis&lt;br /&gt;
 * system programming&lt;br /&gt;
 * windows kernel driver&lt;br /&gt;
 * interested in distributed(non-central)communication &amp;amp; athentication(authentication without trust) system&lt;br /&gt;
 * like rock (heavy metal) &amp;amp; hip-hop music&lt;br /&gt;
 * like scribbling anything&lt;br /&gt;
 * learning Haskell&lt;br /&gt;
 * and my mind&lt;br /&gt;
 * [mailto:happyme9@naver.com happyme9@naver.com]&lt;br /&gt;
 * ...................................................................................................&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=210442</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=210442"/>
				<updated>2016-03-04T05:39:11Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: /* What is the IoT Security Guideline Project? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Testing Guides&lt;br /&gt;
* Top 10 IoT Vulnerabilities&lt;br /&gt;
* IoT Security Guidance&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* Developer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. &lt;br /&gt;
* IoT devices averaged 25 vulnerabilities per    product, indicating expanding attack surface for adversaries&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 IoT Vulnerabilities (2014) =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Top 10 IoT Vulnerabilities (2014) Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilties are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Top 10 IoT Vulnerabiltiies Project? ==&lt;br /&gt;
&lt;br /&gt;
The Top 10 IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the top 10 internet of things vulnerabilities&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
|-  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= IoT Security Guideline =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Guideline Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Guideline provides follows :&lt;br /&gt;
&lt;br /&gt;
====== 1. Secure IoT Software Development Guideline ======&lt;br /&gt;
----&lt;br /&gt;
* Software(or SDK) Running on Device&lt;br /&gt;
* Software Running on IoT Cloud Platform(server-side)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====== 2. Secure IoT Hardware Development Guideline ======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====== 3. Privacy Guideline for IoT Service/System ======&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Guideline Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Guideline Project provides:&lt;br /&gt;
&lt;br /&gt;
* Software Development Guideline&lt;br /&gt;
* Hardware Development Guideline&lt;br /&gt;
* Privacy Guideline&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=210441</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=210441"/>
				<updated>2016-03-04T05:37:44Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: /* IoT Security Guideline Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Testing Guides&lt;br /&gt;
* Top 10 IoT Vulnerabilities&lt;br /&gt;
* IoT Security Guidance&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* Developer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. &lt;br /&gt;
* IoT devices averaged 25 vulnerabilities per    product, indicating expanding attack surface for adversaries&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 IoT Vulnerabilities (2014) =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Top 10 IoT Vulnerabilities (2014) Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilties are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Top 10 IoT Vulnerabiltiies Project? ==&lt;br /&gt;
&lt;br /&gt;
The Top 10 IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the top 10 internet of things vulnerabilities&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
|-  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= IoT Security Guideline =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Guideline Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Guideline provides follows :&lt;br /&gt;
&lt;br /&gt;
====== 1. Secure IoT Software Development Guideline ======&lt;br /&gt;
----&lt;br /&gt;
* Software(or SDK) Running on Device&lt;br /&gt;
* Software Running on IoT Cloud Platform(server-side)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====== 2. Secure IoT Hardware Development Guideline ======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====== 3. Privacy Guideline for IoT Service/System ======&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Guideline Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Guideline Project provides:&lt;br /&gt;
&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=210440</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=210440"/>
				<updated>2016-03-04T05:37:00Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: /* IoT Security Guideline Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Testing Guides&lt;br /&gt;
* Top 10 IoT Vulnerabilities&lt;br /&gt;
* IoT Security Guidance&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* Developer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. &lt;br /&gt;
* IoT devices averaged 25 vulnerabilities per    product, indicating expanding attack surface for adversaries&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 IoT Vulnerabilities (2014) =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Top 10 IoT Vulnerabilities (2014) Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilties are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Top 10 IoT Vulnerabiltiies Project? ==&lt;br /&gt;
&lt;br /&gt;
The Top 10 IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the top 10 internet of things vulnerabilities&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
|-  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= IoT Security Guideline =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Guideline Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Guideline provides follows :&lt;br /&gt;
&lt;br /&gt;
====== Secure IoT Software Development Guideline ======&lt;br /&gt;
----&lt;br /&gt;
* Software(or SDK) Running on Device&lt;br /&gt;
* Software Running on IoT Cloud Platform(server-side)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====== Secure IoT Hardware Development Guideline ======&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====== Privacy Guideline for IoT Service/System ======&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Guideline Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Guideline Project provides:&lt;br /&gt;
&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=210439</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=210439"/>
				<updated>2016-03-04T05:32:53Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: /* IoT Security Guideline Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Testing Guides&lt;br /&gt;
* Top 10 IoT Vulnerabilities&lt;br /&gt;
* IoT Security Guidance&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* Developer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. &lt;br /&gt;
* IoT devices averaged 25 vulnerabilities per    product, indicating expanding attack surface for adversaries&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 IoT Vulnerabilities (2014) =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Top 10 IoT Vulnerabilities (2014) Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilties are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Top 10 IoT Vulnerabiltiies Project? ==&lt;br /&gt;
&lt;br /&gt;
The Top 10 IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the top 10 internet of things vulnerabilities&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
|-  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= IoT Security Guideline =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Guideline Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Guideline provides follows :&lt;br /&gt;
&lt;br /&gt;
* Secure IoT Software Development Guideline&lt;br /&gt;
  * Software(or SDK) Running on Device&lt;br /&gt;
  * Software Running on IoT Cloud Platform(server-side)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Secure IoT Hardware Development Guideline&lt;br /&gt;
&lt;br /&gt;
* Privacy Guideline for IoT Service/System&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Guideline Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Guideline Project provides:&lt;br /&gt;
&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=210438</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=210438"/>
				<updated>2016-03-04T04:52:06Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: /* Project Leaders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Testing Guides&lt;br /&gt;
* Top 10 IoT Vulnerabilities&lt;br /&gt;
* IoT Security Guidance&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* Developer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. &lt;br /&gt;
* IoT devices averaged 25 vulnerabilities per    product, indicating expanding attack surface for adversaries&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 IoT Vulnerabilities (2014) =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Top 10 IoT Vulnerabilities (2014) Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilties are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Top 10 IoT Vulnerabiltiies Project? ==&lt;br /&gt;
&lt;br /&gt;
The Top 10 IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the top 10 internet of things vulnerabilities&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
|-  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= IoT Security Guideline =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Guideline Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Guideline provides follows :&lt;br /&gt;
Coming Soon&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Guideline Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Guideline Project provides:&lt;br /&gt;
&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Yunsoul Yunsoul]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Yunsoul&amp;diff=209930</id>
		<title>User:Yunsoul</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Yunsoul&amp;diff=209930"/>
				<updated>2016-02-29T05:03:38Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Security Engineer&lt;br /&gt;
 * ..........................................................................................................&lt;br /&gt;
 * reverse engineering (x86, ARM, bytecode)&lt;br /&gt;
 * IoT(Internet of Things) security&lt;br /&gt;
 * anti-virus (anti-virus engine for pc and mobile)&lt;br /&gt;
 * mobile security (mobile app security, mobile game security)&lt;br /&gt;
 * malware analysis&lt;br /&gt;
 * system programming&lt;br /&gt;
 * windows kernel driver&lt;br /&gt;
 * interested in distributed(non-central)communication &amp;amp; athentication(authentication without trust) system&lt;br /&gt;
 * like rock (heavy metal) &amp;amp; hip-hop music&lt;br /&gt;
 * like scribbling anything&lt;br /&gt;
 * learning Haskell&lt;br /&gt;
 * and my mind&lt;br /&gt;
 * [mailto:happyme9@naver.com happyme9@naver.com]&lt;br /&gt;
 * ..........................................................................................................&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Yunsoul&amp;diff=209929</id>
		<title>User:Yunsoul</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Yunsoul&amp;diff=209929"/>
				<updated>2016-02-29T05:01:57Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Security Engineer&lt;br /&gt;
 * ..........................................................................................................&lt;br /&gt;
 * reverse engineering (x86, ARM, bytecode)&lt;br /&gt;
 * IoT(Internet of Things) security&lt;br /&gt;
 * anti-virus (anti-virus engine for pc and mobile)&lt;br /&gt;
 * mobile security (mobile app security, mobile game security)&lt;br /&gt;
 * malware analysis&lt;br /&gt;
 * system programming&lt;br /&gt;
 * windows kernel driver&lt;br /&gt;
 * interested in distributed(non-central)communication &amp;amp; athentication(authentication without trust) system&lt;br /&gt;
 * like rock (heavy metal) &amp;amp; hip-hop music&lt;br /&gt;
 * like scribbling anything&lt;br /&gt;
 * learning Haskell&lt;br /&gt;
 * and my mind&lt;br /&gt;
 * happyme9@naver.com&lt;br /&gt;
 * ..........................................................................................................&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=209928</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=209928"/>
				<updated>2016-02-29T05:00:50Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Testing Guides&lt;br /&gt;
* Top 10 IoT Vulnerabilities&lt;br /&gt;
* IoT Security Guidance&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* Developer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. &lt;br /&gt;
* IoT devices averaged 25 vulnerabilities per    product, indicating expanding attack surface for adversaries&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 IoT Vulnerabilities (2014) =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Top 10 IoT Vulnerabilities (2014) Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilties are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Top 10 IoT Vulnerabiltiies Project? ==&lt;br /&gt;
&lt;br /&gt;
The Top 10 IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the top 10 internet of things vulnerabilities&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
|-  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= IoT Security Guideline =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Guideline Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Guideline provides follows :&lt;br /&gt;
Coming Soon&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Guideline Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Guideline Project provides:&lt;br /&gt;
&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Yunsoul&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=209927</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=209927"/>
				<updated>2016-02-29T04:53:20Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Testing Guides&lt;br /&gt;
* Top 10 IoT Vulnerabilities&lt;br /&gt;
* IoT Security Guidance&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* Developer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. &lt;br /&gt;
* IoT devices averaged 25 vulnerabilities per    product, indicating expanding attack surface for adversaries&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 IoT Vulnerabilities (2014) =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Top 10 IoT Vulnerabilities (2014) Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilties are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Top 10 IoT Vulnerabiltiies Project? ==&lt;br /&gt;
&lt;br /&gt;
The Top 10 IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the top 10 internet of things vulnerabilities&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
|-  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= IoT Security Guideline =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Guideline Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Guideline provides follows :&lt;br /&gt;
Coming Soon&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Guideline Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Guideline Project provides:&lt;br /&gt;
&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Yunsoul&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Yunsoul&amp;diff=208497</id>
		<title>User:Yunsoul</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Yunsoul&amp;diff=208497"/>
				<updated>2016-02-11T00:53:57Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Security Engineer&lt;br /&gt;
 * ..........................................................................................................&lt;br /&gt;
 * reverse engineering (x86, ARM, bytecode)&lt;br /&gt;
 * IoT(Internet of Things) security&lt;br /&gt;
 * anti-virus (anti-virus engine for pc and mobile)&lt;br /&gt;
 * mobile security (mobile app security, mobile game security)&lt;br /&gt;
 * malware analysis&lt;br /&gt;
 * system programming&lt;br /&gt;
 * windows kernel driver&lt;br /&gt;
 * interested in distributed(non-central)communication &amp;amp; athentication(authentication without trust) system&lt;br /&gt;
 * like rock (heavy metal) &amp;amp; hip-hop music&lt;br /&gt;
 * like scribbling anything&lt;br /&gt;
 * learning Haskell&lt;br /&gt;
 * and my mind&lt;br /&gt;
 * ..........................................................................................................&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2014-I2_Insufficient_Authentication/Authorization&amp;diff=208175</id>
		<title>Top 10 2014-I2 Insufficient Authentication/Authorization</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2014-I2_Insufficient_Authentication/Authorization&amp;diff=208175"/>
				<updated>2016-02-05T06:58:04Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Top_10_IoT_Vulnerabilities__282014_29 Back To The Internet of Things Top 10]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013|language=en}}&lt;br /&gt;
{{Top_10:SummaryTableTemplate|exploitability=2|prevalence=2|detectability=1|impact=1|year=2013|language=en}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Consider anyone who has access to the web interface, mobile interface or cloud interface including internal and external users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Attacker uses weak passwords, insecure password recovery mechanisms, poorly protected credentials or lack of granular access control to access a particular interface. Attack could come from external or internal users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Authentication may not be sufficient when weak passwords are used or are poorly protected. Insufficient authentication/authorization is prevalent as it is assumed that interfaces will only be exposed to users on internal networks and not to external users on other networks. Deficiencies are often found to be present across all interfaces. Many Issues with authentication/authorization are easy to discover when examining the interface manually and can also be discovered via automated testing.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Insufficient authentication/authorization can result in data loss or corruption, lack of accountability, or denial of access and can lead to complete compromise of the device and/or user accounts.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Consider the business impact of compromised user accounts and possibly devices. All data could be stolen, modified, or deleted.  Could your customers be harmed?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate|year=2013}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=Is My Authentication/Authorization Sufficient?|position=firstLeft|year=2013|language=en}}&lt;br /&gt;
&lt;br /&gt;
Checking for Insufficient Authentication includes:&lt;br /&gt;
* Attempting to use simple passwords such as &amp;quot;1234&amp;quot; is a fast and easy way to determine if the password policy is sufficient across all interfaces&lt;br /&gt;
* Reviewing network traffic to determine if credentials are being transmitted in clear text&lt;br /&gt;
* Reviewing requirements around password controls such as password complexity, password history check, password expiration and forced password reset for new users&lt;br /&gt;
* Reviewing whether re-authentication is required for sensitive features&lt;br /&gt;
&lt;br /&gt;
Checking for Insufficient Authorization includes:&lt;br /&gt;
* Reviewing the various interfaces to determine whether the interfaces allow for separation of roles. For example, all features will be accessible to administrators, but users will have a more limited set of features available.&lt;br /&gt;
* Reviewing access controls and testing for privilege escalation&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=How Do I Make My Authentication/Authorization Better?|position=right|year=2013|language=en}}&lt;br /&gt;
Sufficient authentication/authorization requires:&lt;br /&gt;
# Ensuring that the strong passwords are required&lt;br /&gt;
# Ensuring granular access control is in place when necessary&lt;br /&gt;
# Ensuring credentials are properly protected&lt;br /&gt;
# Implement two factor authentication where possible&lt;br /&gt;
# Ensuring that password recovery mechanisms are secure&lt;br /&gt;
# Ensuring re-authentication is required for sensitive features&lt;br /&gt;
# Ensuring options are available for configuring password controls&lt;br /&gt;
# Ensuring credential can be revoked&lt;br /&gt;
# The app authentication is required&lt;br /&gt;
# The device authentication is required&lt;br /&gt;
# The server authentication is required&lt;br /&gt;
# Manage authenicated user id(credential info.) and the user's device id, the user's app id mapping table in the authentication server&lt;br /&gt;
# Ensuring that the authentication token/session key issuing to client is always different&lt;br /&gt;
# Ensuring that the user id, app id, device id is universally unique&lt;br /&gt;
&lt;br /&gt;
Please review the following tabs for more detail based on whether you are a [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Manufacturers Manufacturer], [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Developers Developer] or [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Consumers Consumer]&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=1|year=2013|language=en}}&lt;br /&gt;
'''Scenario #1:''' The interface only requires simple passwords.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
Username = Bob; Password = 1234&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
'''Scenario #2:''' Username and password are poorly protected when transmitted over the network.&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
Authorization: Basic YWRtaW46MTIzNA==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
In the cases above, the attacker is able to either easily guess the password or is able to capture the credentials as they cross the network and decode it since the credentials are only protected using Base64 Encoding.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=1|year=2013|language=en}}&lt;br /&gt;
{{Top_10_2010:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Top_10_2013-A2-Broken_Authentication_and_Session_Management Top 10 2013-A2-Broken Authentication and Session Management]&lt;br /&gt;
{{Top_10_2010:SubSubsectionExternalReferencesTemplate}}&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2014-I9_Insecure_Software/Firmware&amp;diff=208174</id>
		<title>Top 10 2014-I9 Insecure Software/Firmware</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2014-I9_Insecure_Software/Firmware&amp;diff=208174"/>
				<updated>2016-02-05T06:57:11Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Top_10_IoT_Vulnerabilities__282014_29 Back To The Internet of Things Top 10]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013|language=en}}&lt;br /&gt;
{{Top_10:SummaryTableTemplate|exploitability=3|prevalence=2|detectability=1|impact=1|year=2013|language=en}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Consider anyone who has access to the device and/or the network the device resides on. Also consider anyone who could gain access to the update server.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Attacker uses multiple vectors such as capturing update files via unencrypted connections, the update file itself is not encrypted or they are able to perform their own malicious update via DNS hijacking. Depending on method of update and device configuration, attack could come from the local network or the internet.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;The lack of ability for a device to be updated presents a security weakness on its own. Devices should have the ability to be updated when vulnerabilities are discovered and software/firmware updates can be insecure when the updated files themselves and the network connection they are delivered on are not protected. Software/Firmware can also be insecure if they contain hardcoded sensitive data such as credentials. Security issues with software/firmware are relatively easy to discover by simply inspecting the network traffic during the update to check for encryption or using a hex editor to inspect the update file itself for interesting information.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Insecure software/firmware could lead to compromise of user data, control over the device and attacks against other devices.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Consider the business impact if data can be stolen or modified and devices taken control of for the purpose of attacking other devices.  Could your customers be harmed? Could other users be harmed?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate|year=2013}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=Is My Software/Firmware Secure?|position=firstLeft|year=2013|language=en}}&lt;br /&gt;
* Note - It is very important that devices first and foremost have the ability to update and perform updates regularly.&lt;br /&gt;
Checking for insecure software/firmware updates include:&lt;br /&gt;
* Reviewing the update file itself for exposure of sensitive information in human readable format by someone using a hex edit tool&lt;br /&gt;
* Reviewing the production file update for proper encryption using accepted algorithms&lt;br /&gt;
* Reviewing the production file update to ensure it is properly signed&lt;br /&gt;
* Reviewing the communication method used to transmit the update&lt;br /&gt;
* Reviewing the cloud update server to ensure transport encryption methods are up to date and properly configured and that the server itself is not vulnerable&lt;br /&gt;
* Reviewing the device for proper validation of signed update files&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=How Do I Secure My Software/Firmware?|position=right|year=2013|language=en}}&lt;br /&gt;
Securing software/firmware require:&lt;br /&gt;
# Ensuring the device has the ability to update (very important, need secure update mechanism)&lt;br /&gt;
# Ensuring the update file is encrypted using accepted encryption methods&lt;br /&gt;
# Ensuring the update file is transmitted via an encrypted connection&lt;br /&gt;
# Ensuring the update file does not expose sensitive data&lt;br /&gt;
# Ensuring the update is signed and verified before allowing the update to be uploaded and applied&lt;br /&gt;
# Ensuring the update server is secure&lt;br /&gt;
# Implement the secure boot if possible (chain of trust)&lt;br /&gt;
&lt;br /&gt;
Please review the following tabs for more detail based on whether you are a [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Manufacturers Manufacturer], [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Developers Developer] or [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Consumers Consumer]&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=1|year=2013|language=en}}&lt;br /&gt;
'''Scenario #1:''' Update file is transmitted via HTTP.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.xyz.com/update.bin&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
'''Scenario #2:''' Update file is unencrypted and human readable data can be viewed.&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
�v�ñ]��Ü��Qw�û]��ˇ3DP�Ö�∂]��ˇ3DPadmin.htmadvanced.htmalarms.htm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
In the cases above, the attacker is able to either capture the update file or capture the file and view it's contents.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=1|year=2013|language=en}}&lt;br /&gt;
{{Top_10_2010:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubSubsectionExternalReferencesTemplate}}&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2014-I7_Insecure_Mobile_Interface&amp;diff=208173</id>
		<title>Top 10 2014-I7 Insecure Mobile Interface</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2014-I7_Insecure_Mobile_Interface&amp;diff=208173"/>
				<updated>2016-02-05T06:53:45Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Top_10_IoT_Vulnerabilities__282014_29 Back To The Internet of Things Top 10]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013|language=en}}&lt;br /&gt;
{{Top_10:SummaryTableTemplate|exploitability=2|prevalence=2|detectability=1|impact=1|year=2013|language=en}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Consider anyone who has access to the mobile application.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Attacker uses multiple vectors such as insufficient authentication, lack of transport encryption and account enumeration to access data or controls via the mobile interface.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;An insecure mobile interface is present when easy to guess credentials are used or account enumeration is possible. Insecure mobile interfaces are easy to discover by simply reviewing the connection to the wireless networks and identifying if SSL is in use or by using the password reset mechanism to identify valid accounts which can lead to account enumeration.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;An insecure mobile interface could lead to compromise of user data and control over the device.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Consider the business impact of an insecure mobile interface. Data could be stolen or modified and control over devices assumed. Could your customers be harmed? Could your brand be harmed?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate|year=2013}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=Is My Mobile Interface Secure?|position=firstLeft|year=2013|language=en}}&lt;br /&gt;
Checking for an Insecure Mobile Interface includes:&lt;br /&gt;
* Determining if the default username and password can be changed during initial product setup&lt;br /&gt;
* Determining if a specific user account is locked out after 3 - 5 failed login attempts&lt;br /&gt;
* Determining if valid accounts can be identified using password recovery mechanisms or new user pages&lt;br /&gt;
* Reviewing whether credentials are exposed while connected to wireless networks&lt;br /&gt;
* Reviewing whether two factor authentication options are available&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=How Do I Secure My Mobile Interface?|position=right|year=2013|language=en}}&lt;br /&gt;
A secure mobile interface requires:&lt;br /&gt;
# Default passwords and ideally default usernames to be changed during initial setup&lt;br /&gt;
# Ensuring user accounts can not be enumerated using functionality such as password reset mechanisms&lt;br /&gt;
# Ensuring account lockout after an 3 - 5 failed login attempts&lt;br /&gt;
# Ensuring credentials are not exposed while connected to wireless networks&lt;br /&gt;
# Implementing two factor authentication if possible&lt;br /&gt;
# Apply mobile app obfuscation techinque&lt;br /&gt;
# Implement mbile app anti-tempering mechanism&lt;br /&gt;
# Ensuring the mobile app's memory hacking is possible&lt;br /&gt;
# Restric the mobile app's execution on tempered OS environment&lt;br /&gt;
&lt;br /&gt;
Please review the following tabs for more detail based on whether you are a [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Manufacturers Manufacturer], [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Developers Developer] or [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Consumers Consumer]&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=1|year=2013|language=en}}&lt;br /&gt;
'''Scenario #1:''' Password reset indicates whether account exist or not.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
Password Reset&lt;br /&gt;
&amp;quot;That account does not exist.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
'''Scenario #2:''' Username and password are poorly protected when transmitted over the network.&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
Authorization: Basic S2ZjSDFzYkF4ZzoxMjM0NTY3&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
In the cases above, the attacker is able to either determine a valid user account or is able to capture the credentials as they cross the network and decode them since the credentials are only protected using Base64 Encoding.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=1|year=2013|language=en}}&lt;br /&gt;
{{Top_10_2010:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks OWASP Top Ten Mobile Risks]&lt;br /&gt;
{{Top_10_2010:SubSubsectionExternalReferencesTemplate}}&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2014-I6_Insecure_Cloud_Interface&amp;diff=208172</id>
		<title>Top 10 2014-I6 Insecure Cloud Interface</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2014-I6_Insecure_Cloud_Interface&amp;diff=208172"/>
				<updated>2016-02-05T06:37:55Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Top_10_IoT_Vulnerabilities__282014_29 Back To The Internet of Things Top 10]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013|language=en}}&lt;br /&gt;
{{Top_10:SummaryTableTemplate|exploitability=2|prevalence=2|detectability=1|impact=1|year=2013|language=en}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Consider anyone who has access to the internet.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Attacker uses multiple vectors such as insufficient authentication, lack of transport encryption and account enumeration to access data or controls via the cloud website. Attack will most likely come from the internet.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;An insecure cloud interface is present when easy to guess credentials are used or account enumeration is possible. Insecure cloud interfaces are easy to discover by simply reviewing the connection to the cloud interface and identifying if SSL is in use or by using the password reset mechanism to identify valid accounts which can lead to account enumeration.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;An insecure cloud interface could lead to compromise of user data and control over the device.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Consider the business impact of an insecure cloud interface. Data could be stolen or modified and control over devices assumed.  Could your customers be harmed? Could your brand be harmed?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate|year=2013}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=Is My Cloud Interface Secure?|position=firstLeft|year=2013|language=en}}&lt;br /&gt;
Checking for a Insecure Cloud Interface includes:&lt;br /&gt;
* Determining if the default username and password can be changed during initial product setup&lt;br /&gt;
* Determining if a specific user account is locked out after 3 - 5 failed login attempts&lt;br /&gt;
* Determining if valid accounts can be identified using password recovery mechanisms or new user pages&lt;br /&gt;
* Reviewing the interface for issues such as cross-site scripting, cross-site request forgery and sql injection.&lt;br /&gt;
* Reviewing all cloud interfaces for vulnerabilities (API interfaces and cloud-based web interfaces)&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=How Do I Secure My Cloud Interface?|position=right|year=2013|language=en}}&lt;br /&gt;
A secure cloud interface requires:&lt;br /&gt;
# Default passwords and ideally default usernames to be changed during initial setup&lt;br /&gt;
# Ensuring user accounts can not be enumerated using functionality such as password reset mechanisms&lt;br /&gt;
# Ensuring account lockout after 3- 5 failed login attempts&lt;br /&gt;
# Ensuring the cloud-based web interface is not susceptible to XSS, SQLi or CSRF&lt;br /&gt;
# Ensuring credentials are not exposed over the internet&lt;br /&gt;
# Implement two factor authentication if possible&lt;br /&gt;
# Detect or block the abnormal reqests/attempts&lt;br /&gt;
&lt;br /&gt;
Please review the following tabs for more detail based on whether you are a [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Manufacturers Manufacturer], [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Developers Developer] or [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Consumers Consumer]&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=1|year=2013|language=en}}&lt;br /&gt;
'''Scenario #1:''' Password reset indicates whether account is valid.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
Password Reset &amp;quot;That account does not exist.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
'''Scenario #2:''' Username and password are poorly protected when transmitted over the network.&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
Authorization: Basic S2ZjSDFzYkF4ZzoxMjM0NTY3&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
In the cases above, the attacker is able to either determine a valid user account or is able to capture the credentials as they cross the network and decode them since the credentials are only protected using Base64 Encoding.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=1|year=2013|language=en}}&lt;br /&gt;
{{Top_10_2010:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_10_2013-A1-Injection Top 10 2013-A1-Injection]&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_10_2013-A3-Cross-Site_Scripting_(XSS) Top 10 2013-A3-Cross-Site Scripting]&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) Top 10 2013-A8-Cross-Site Request Forgery (CSRF)]&lt;br /&gt;
{{Top_10_2010:SubSubsectionExternalReferencesTemplate}}&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2014-I5_Privacy_Concerns&amp;diff=208171</id>
		<title>Top 10 2014-I5 Privacy Concerns</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2014-I5_Privacy_Concerns&amp;diff=208171"/>
				<updated>2016-02-05T06:34:03Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Top_10_IoT_Vulnerabilities__282014_29 Back To The Internet of Things Top 10]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013|language=en}}&lt;br /&gt;
{{Top_10:SummaryTableTemplate|exploitability=2|prevalence=2|detectability=1|impact=1|year=2013|language=en}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Consider anyone who has access to the device itself, the network the device is connected to, the mobile application and the cloud connection including external and internal users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Attacker uses multiple vectors such as insufficient authentication, lack of transport encryption or insecure network services to view personal data which is not being properly protected or is being collected unnecessarily. Attack could come from external or internal users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Privacy concerns generated by the collection of personal data in addition to the lack of proper protection of that data is prevalent. Privacy concerns are easy to discover by simply reviewing the data that is being collected as the user sets up and activates the device. Automated tools can also look for specific patterns of data that may indicate collection of personal data or other sensitive data.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Collection of personal data along with a lack of protection of that data can lead to compromise of a user's personal data.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Consider the business impact of personal data that is collected unnecessarily or isn't protected properly. Data could be stolen.  Could your customers be harmed by having this personal data exposed?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate|year=2013}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=Does My Device Present Privacy Concerns?|position=firstLeft|year=2013|language=en}}&lt;br /&gt;
Checking for Privacy Concerns includes:&lt;br /&gt;
* Identifying all data types that are being collected by the device, its mobile application and any cloud interfaces&lt;br /&gt;
* The device and it's various components should only collect what is necessary to perform its function&lt;br /&gt;
* Personally identifiable information can be exposed when not properly encrypted while at rest on storage mediums and during transit over networks&lt;br /&gt;
* Reviewing who has access to personal information that is collected&lt;br /&gt;
* Determining if data collected can be de-identified or anonymized&lt;br /&gt;
* Determining if data collected is beyond what is needed for proper operation of the device (Does the end-user have a choice for this data collection?)&lt;br /&gt;
* Determining if a data retention policy is in place&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=How Do I Prevent Privacy Concerns?|position=right|year=2013|language=en}}&lt;br /&gt;
Minimizing privacy concerns requires:&lt;br /&gt;
# Ensuring only data critical to the functionality of the device is collected&lt;br /&gt;
# Ensuring that any data collected is of a less sensitive nature (i.e., try not to collect sensitive data)&lt;br /&gt;
# Ensuring that any data collected is de-identified or anonymized&lt;br /&gt;
# Ensuring any data collected is properly protected with encryption&lt;br /&gt;
# Ensuring the device and all of its components properly protect personal information&lt;br /&gt;
# Ensuring only authorized individuals have access to collected personal information&lt;br /&gt;
# Ensuring that retention limits are set for collected data&lt;br /&gt;
# Ensuring that end-users are provided with &amp;quot;Notice and Choice&amp;quot; if data collected is more than what would be expected from the product&lt;br /&gt;
# Ensuring the role based access control/authorization to the collected data/analyzed data is applied&lt;br /&gt;
# Ensuring that the analyzed data is de-identified&lt;br /&gt;
&lt;br /&gt;
Please review the following tabs for more detail based on whether you are a [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Manufacturers Manufacturer], [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Developers Developer] or [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Consumers Consumer]&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=1|year=2013|language=en}}&lt;br /&gt;
'''Scenario #1:''' Collection of personal data.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
Date of birth, home address, phone number, etc.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
'''Scenario #2:''' Collection of financial and/or health information.&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
Credit card data and bank account information.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
In the cases above, exposure of any of the data examples could lead to identity theft or compromise of accounts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=1|year=2013|language=en}}&lt;br /&gt;
{{Top_10_2010:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Top_10_2013-A6-Sensitive_Data_Exposure Top 10 2013-A6-Sensitive Data Exposure]&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubSubsectionExternalReferencesTemplate}} &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.ftc.gov/tips-advice/business-center/guidance/careful-connections-building-security-internet-things FTC: Careful Connections: Building Security in the Internet of Things]&lt;br /&gt;
[https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf FTC: Internet of Things, Privacy &amp;amp; Security in a Connected World]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=208170</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=208170"/>
				<updated>2016-02-05T06:09:16Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: /* Top 10 IoT Vulnerabilities (2014) Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Testing Guides&lt;br /&gt;
* Top 10 IoT Vulnerabilities&lt;br /&gt;
* IoT Security Guidance&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* Developer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. &lt;br /&gt;
* IoT devices averaged 25 vulnerabilities per    product, indicating expanding attack surface for adversaries&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 IoT Vulnerabilities (2014) =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Top 10 IoT Vulnerabilities (2014) Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilties are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Top 10 IoT Vulnerabiltiies Project? ==&lt;br /&gt;
&lt;br /&gt;
The Top 10 IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the top 10 internet of things vulnerabilities&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
|-  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/tag/podcasts/ IoT Inc]&lt;br /&gt;
* [https://soundcloud.com/craig-smith-381 IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2014-I4_Lack_of_Transport_Encryption&amp;diff=208169</id>
		<title>Top 10 2014-I4 Lack of Transport Encryption</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2014-I4_Lack_of_Transport_Encryption&amp;diff=208169"/>
				<updated>2016-02-05T06:08:44Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Top_10_IoT_Vulnerabilities__282014_29 Back To The Internet of Things Top 10]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013|language=en}}&lt;br /&gt;
{{Top_10:SummaryTableTemplate|exploitability=2|prevalence=2|detectability=1|impact=1|year=2013|language=en}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Consider anyone who has access to the network the device is connected to, including external and internal users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Attacker uses the lack of transport encryption to view data being passed over the network. Attack could come from external or internal users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Lack of transport encryption allows data to be viewed as it travels over local networks or the internet. Lack of transport encryption is prevalent on local networks as it is easy to assume that local network traffic will not be widely visible, however in the case of a local wireless network, misconfiguration of that wireless network can make traffic visible to anyone within range of that wireless network. Many Issues with transport encryption are easy to discover simply by viewing network traffic and searching for readable data. Automated tools can also look for proper implementation of common transport encryption such as SSL and TLS.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Lack of transport encryption can result in data loss and depending on the data exposed, could lead to complete compromise of the device or user accounts.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Consider the business impact of exposed data as it travels across various networks. Data could be stolen or modified.  Could your users be harmed by having their data exposed?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate|year=2013}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=Do I Use Transport Encryption?|position=firstLeft|year=2013|language=en}}&lt;br /&gt;
Checking for Lack of Transport Encryption includes:&lt;br /&gt;
* Reviewing network traffic of the device, its mobile application and any cloud connections to determine if any information is passed in clear text&lt;br /&gt;
* Reviewing the use of SSL or TLS to ensure it is up to date and properly implemented&lt;br /&gt;
* Reviewing the use of any encryption protocols to ensure they are recommended and accepted&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=How Do I Use Transport Encryption?|position=right|year=2013|language=en}}&lt;br /&gt;
Sufficient transport encryption requires:&lt;br /&gt;
# Ensuring data is encrypted using protocols such as SSL and TLS while transiting networks.&lt;br /&gt;
# Ensuring other industry standard encryption techniques are utilized to protect data during transport if SSL or TLS are not available.&lt;br /&gt;
# Ensuring only accepted encryption standards are used and avoid using proprietary encryption protocols&lt;br /&gt;
# Ensuring the message payload encryption&lt;br /&gt;
# Ensuring the secure encryption key handshaking&lt;br /&gt;
# Ensuring received data integrity verification&lt;br /&gt;
&lt;br /&gt;
Please review the following tabs for more detail based on whether you are a [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Manufacturers Manufacturer], [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Developers Developer] or [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Consumers Consumer]&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=1|year=2013|language=en}}&lt;br /&gt;
'''Scenario #1:''' The cloud interface uses only HTTP.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.xyzcloudsite.com&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
'''Scenario #2:''' Username and password are transmitted in the clear over the network.&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.xyzcloud.com/login.php?userid=3&amp;amp;password=1234&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
In the cases above, the attacker has the ability to view sensitive data in the clear due to lack of transport encryption.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=1|year=2013|language=en}}&lt;br /&gt;
{{Top_10_2010:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Top_10_2013-A6-Sensitive_Data_Exposure Top 10 2013-A6-Sensitive Data Exposure]&lt;br /&gt;
{{Top_10_2010:SubSubsectionExternalReferencesTemplate}}&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2014-I3_Insecure_Network_Services&amp;diff=208168</id>
		<title>Top 10 2014-I3 Insecure Network Services</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2014-I3_Insecure_Network_Services&amp;diff=208168"/>
				<updated>2016-02-05T05:56:38Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Top_10_IoT_Vulnerabilities__282014_29 Back To The Internet of Things Top 10]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013|language=en}}&lt;br /&gt;
{{Top_10:SummaryTableTemplate|exploitability=2|prevalence=3|detectability=2|impact=2|year=2013|language=en}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Consider anyone who has access to the device via a network connection, including external and internal users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Attacker uses vulnerable network services to attack the device itself or bounce attacks off the device. Attack could come from external or internal users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Insecure network services may be susceptible to buffer overflow attacks or attacks that create a denial of service condition leaving the device inaccessible to the user. Denial of service attacks against other users may also be facilitated when insecure network services are available. Insecure network services can often be detected by automated tools such as port scanners and fuzzers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Insecure network services can result in data loss or corruption, denial of service or facilitation of attacks on other devices.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Consider the business impact of devices which have been rendered useless from a denial of service attack or the device is used to facilitate attacks against other devices and networks. Could your customers or other users be harmed?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate|year=2013}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=Are My Network Services Secure?|position=firstLeft|year=2013|language=en}}&lt;br /&gt;
Checking for Insecure Network Services includes:&lt;br /&gt;
* Determining if insecure network services exist by reviewing your device for open ports using a port scanner&lt;br /&gt;
* As open ports are identified, each can be tested using any number of automated tools that look for DoS vulnerabilities, vulnerabilities related to UDP services and vulnerabilities related to buffer overflow and fuzzing attacks&lt;br /&gt;
* Reviewing network ports to ensure they are absolutely necessary and if there are any ports being exposed to the internet using UPnP.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=How Do I Secure My Network Services?|position=right|year=2013|language=en}}&lt;br /&gt;
Securing network services requires:&lt;br /&gt;
# Ensuring only necessary ports are exposed and available.&lt;br /&gt;
# Ensuring services are not vulnerable to buffer overflow and fuzzing attacks.&lt;br /&gt;
# Ensuring services are not vulnerable to DoS attacks which can affect the device itself or other devices and/or users on the local network or other networks.&lt;br /&gt;
# Ensuring network ports or services are not exposed to the internet via UPnP for example&lt;br /&gt;
# The abnormal service request traffic should be detected and blocked on service gateway layer&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please review the following tabs for more detail based on whether you are a [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Manufacturers Manufacturer], [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Developers Developer] or [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Consumers Consumer]&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=1|year=2013|language=en}}&lt;br /&gt;
'''Scenario #1:''' Fuzzing attack causes network service and device to crash.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
GET %s%s%s%s%s%s%s%s%s%s%s%s%s%s%s HTTP/1.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
'''Scenario #2:''' Ports open to the internet possibly without the user's knowledge via UPnP.&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
Port 80 and 443 exposed to the internet via a home router.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
In the cases above, the attacker is able to disable the device completely with an HTTP GET or access the device via the internet over port 80 and/or port 443.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=1|year=2013|language=en}}&lt;br /&gt;
{{Top_10_2010:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubSubsectionExternalReferencesTemplate}}&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2014-I2_Insufficient_Authentication/Authorization&amp;diff=208167</id>
		<title>Top 10 2014-I2 Insufficient Authentication/Authorization</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2014-I2_Insufficient_Authentication/Authorization&amp;diff=208167"/>
				<updated>2016-02-05T05:48:04Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Top_10_IoT_Vulnerabilities__282014_29 Back To The Internet of Things Top 10]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013|language=en}}&lt;br /&gt;
{{Top_10:SummaryTableTemplate|exploitability=2|prevalence=2|detectability=1|impact=1|year=2013|language=en}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Consider anyone who has access to the web interface, mobile interface or cloud interface including internal and external users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Attacker uses weak passwords, insecure password recovery mechanisms, poorly protected credentials or lack of granular access control to access a particular interface. Attack could come from external or internal users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Authentication may not be sufficient when weak passwords are used or are poorly protected. Insufficient authentication/authorization is prevalent as it is assumed that interfaces will only be exposed to users on internal networks and not to external users on other networks. Deficiencies are often found to be present across all interfaces. Many Issues with authentication/authorization are easy to discover when examining the interface manually and can also be discovered via automated testing.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Insufficient authentication/authorization can result in data loss or corruption, lack of accountability, or denial of access and can lead to complete compromise of the device and/or user accounts.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Consider the business impact of compromised user accounts and possibly devices. All data could be stolen, modified, or deleted.  Could your customers be harmed?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate|year=2013}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=Is My Authentication/Authorization Sufficient?|position=firstLeft|year=2013|language=en}}&lt;br /&gt;
&lt;br /&gt;
Checking for Insufficient Authentication includes:&lt;br /&gt;
* Attempting to use simple passwords such as &amp;quot;1234&amp;quot; is a fast and easy way to determine if the password policy is sufficient across all interfaces&lt;br /&gt;
* Reviewing network traffic to determine if credentials are being transmitted in clear text&lt;br /&gt;
* Reviewing requirements around password controls such as password complexity, password history check, password expiration and forced password reset for new users&lt;br /&gt;
* Reviewing whether re-authentication is required for sensitive features&lt;br /&gt;
&lt;br /&gt;
Checking for Insufficient Authorization includes:&lt;br /&gt;
* Reviewing the various interfaces to determine whether the interfaces allow for separation of roles. For example, all features will be accessible to administrators, but users will have a more limited set of features available.&lt;br /&gt;
* Reviewing access controls and testing for privilege escalation&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=How Do I Make My Authentication/Authorization Better?|position=right|year=2013|language=en}}&lt;br /&gt;
Sufficient authentication/authorization requires:&lt;br /&gt;
# Ensuring that the strong passwords are required&lt;br /&gt;
# Ensuring granular access control is in place when necessary&lt;br /&gt;
# Ensuring credentials are properly protected&lt;br /&gt;
# Implement two factor authentication where possible&lt;br /&gt;
# Ensuring that password recovery mechanisms are secure&lt;br /&gt;
# Ensuring re-authentication is required for sensitive features&lt;br /&gt;
# Ensuring options are available for configuring password controls&lt;br /&gt;
# Ensuring credential can be revoked&lt;br /&gt;
# The app authentication is required&lt;br /&gt;
# The device authentication is required&lt;br /&gt;
# Manage authenicated user id(credential info.) and the user's device id, the user's app id mapping table in the authentication server&lt;br /&gt;
# Ensuring that the authentication token/session key issuing to client is always different&lt;br /&gt;
# Ensuring that the user id, app id, device id is universally unique&lt;br /&gt;
&lt;br /&gt;
Please review the following tabs for more detail based on whether you are a [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Manufacturers Manufacturer], [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Developers Developer] or [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Consumers Consumer]&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=1|year=2013|language=en}}&lt;br /&gt;
'''Scenario #1:''' The interface only requires simple passwords.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
Username = Bob; Password = 1234&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
'''Scenario #2:''' Username and password are poorly protected when transmitted over the network.&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
Authorization: Basic YWRtaW46MTIzNA==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
In the cases above, the attacker is able to either easily guess the password or is able to capture the credentials as they cross the network and decode it since the credentials are only protected using Base64 Encoding.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=1|year=2013|language=en}}&lt;br /&gt;
{{Top_10_2010:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Top_10_2013-A2-Broken_Authentication_and_Session_Management Top 10 2013-A2-Broken Authentication and Session Management]&lt;br /&gt;
{{Top_10_2010:SubSubsectionExternalReferencesTemplate}}&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2014-I2_Insufficient_Authentication/Authorization&amp;diff=208166</id>
		<title>Top 10 2014-I2 Insufficient Authentication/Authorization</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2014-I2_Insufficient_Authentication/Authorization&amp;diff=208166"/>
				<updated>2016-02-05T05:47:40Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Top_10_IoT_Vulnerabilities__282014_29 Back To The Internet of Things Top 10]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013|language=en}}&lt;br /&gt;
{{Top_10:SummaryTableTemplate|exploitability=2|prevalence=2|detectability=1|impact=1|year=2013|language=en}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Consider anyone who has access to the web interface, mobile interface or cloud interface including internal and external users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Attacker uses weak passwords, insecure password recovery mechanisms, poorly protected credentials or lack of granular access control to access a particular interface. Attack could come from external or internal users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Authentication may not be sufficient when weak passwords are used or are poorly protected. Insufficient authentication/authorization is prevalent as it is assumed that interfaces will only be exposed to users on internal networks and not to external users on other networks. Deficiencies are often found to be present across all interfaces. Many Issues with authentication/authorization are easy to discover when examining the interface manually and can also be discovered via automated testing.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Insufficient authentication/authorization can result in data loss or corruption, lack of accountability, or denial of access and can lead to complete compromise of the device and/or user accounts.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}&amp;gt;Consider the business impact of compromised user accounts and possibly devices. All data could be stolen, modified, or deleted.  Could your customers be harmed?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate|year=2013}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=Is My Authentication/Authorization Sufficient?|position=firstLeft|year=2013|language=en}}&lt;br /&gt;
&lt;br /&gt;
Checking for Insufficient Authentication includes:&lt;br /&gt;
* Attempting to use simple passwords such as &amp;quot;1234&amp;quot; is a fast and easy way to determine if the password policy is sufficient across all interfaces&lt;br /&gt;
* Reviewing network traffic to determine if credentials are being transmitted in clear text&lt;br /&gt;
* Reviewing requirements around password controls such as password complexity, password history check, password expiration and forced password reset for new users&lt;br /&gt;
* Reviewing whether re-authentication is required for sensitive features&lt;br /&gt;
&lt;br /&gt;
Checking for Insufficient Authorization includes:&lt;br /&gt;
* Reviewing the various interfaces to determine whether the interfaces allow for separation of roles. For example, all features will be accessible to administrators, but users will have a more limited set of features available.&lt;br /&gt;
* Reviewing access controls and testing for privilege escalation&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=How Do I Make My Authentication/Authorization Better?|position=right|year=2013|language=en}}&lt;br /&gt;
Sufficient authentication/authorization requires:&lt;br /&gt;
# Ensuring that the strong passwords are required&lt;br /&gt;
# Ensuring granular access control is in place when necessary&lt;br /&gt;
# Ensuring credentials are properly protected&lt;br /&gt;
# Implement two factor authentication where possible&lt;br /&gt;
# Ensuring that password recovery mechanisms are secure&lt;br /&gt;
# Ensuring re-authentication is required for sensitive features&lt;br /&gt;
# Ensuring options are available for configuring password controls&lt;br /&gt;
# Ensuring credential can be revoked&lt;br /&gt;
# The app authentication is required&lt;br /&gt;
# The device authentication is required&lt;br /&gt;
# Manage authenicated user id(creadential info.) and the user's device id, the user's app id mapping table in the authentication server&lt;br /&gt;
# Ensuring that the authentication token/session key issuing to client is always different&lt;br /&gt;
# Ensuring that the user id, app id, device id is universally unique&lt;br /&gt;
&lt;br /&gt;
Please review the following tabs for more detail based on whether you are a [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Manufacturers Manufacturer], [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Developers Developer] or [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Consumers Consumer]&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=1|year=2013|language=en}}&lt;br /&gt;
'''Scenario #1:''' The interface only requires simple passwords.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
Username = Bob; Password = 1234&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
'''Scenario #2:''' Username and password are poorly protected when transmitted over the network.&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
Authorization: Basic YWRtaW46MTIzNA==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
In the cases above, the attacker is able to either easily guess the password or is able to capture the credentials as they cross the network and decode it since the credentials are only protected using Base64 Encoding.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=1|year=2013|language=en}}&lt;br /&gt;
{{Top_10_2010:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Top_10_2013-A2-Broken_Authentication_and_Session_Management Top 10 2013-A2-Broken Authentication and Session Management]&lt;br /&gt;
{{Top_10_2010:SubSubsectionExternalReferencesTemplate}}&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=208099</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=208099"/>
				<updated>2016-02-04T09:31:16Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: /* IoT Attack Surface Areas Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Testing Guides&lt;br /&gt;
* Top 10 IoT Vulnerabilities&lt;br /&gt;
* IoT Security Guidance&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* Developer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. &lt;br /&gt;
* IoT devices averaged 25 vulnerabilities per    product, indicating expanding attack surface for adversaries&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 IoT Vulnerabilities (2014) =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Top 10 IoT Vulnerabilities (2014) Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilties are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Top 10 IoT Vulnerabiltiies Project? ==&lt;br /&gt;
&lt;br /&gt;
The Top 10 IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the top 10 internet of things vulnerabilities&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
|-  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/tag/podcasts/ IoT Inc]&lt;br /&gt;
* [https://soundcloud.com/craig-smith-381 IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=208097</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=208097"/>
				<updated>2016-02-04T08:17:03Z</updated>
		
		<summary type="html">&lt;p&gt;Yunsoul: /* IoT Attack Surface Areas Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides:&lt;br /&gt;
&lt;br /&gt;
* IoT Attack Surface Areas&lt;br /&gt;
* IoT Testing Guides&lt;br /&gt;
* Top 10 IoT Vulnerabilities&lt;br /&gt;
* IoT Security Guidance&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* Developer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Major Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler gave his IoT talk at DEFCON 23&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. &lt;br /&gt;
* IoT devices averaged 25 vulnerabilities per    product, indicating expanding attack surface for adversaries&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Encryption (Symmetric, Asymmetric)&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, Zigbee, Bluetooth)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top IoT Vulnerabilities]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 IoT Vulnerabilities (2014) =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Top 10 IoT Vulnerabilities (2014) Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 IoT Vulnerabilties are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''I1'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I2'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I3'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]]&lt;br /&gt;
|-&lt;br /&gt;
| '''I4'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I5'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I6'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I7'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I8'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I9'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]]&lt;br /&gt;
|- &lt;br /&gt;
| '''I10'''&lt;br /&gt;
|&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]]&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Top 10 IoT Vulnerabiltiies Project? ==&lt;br /&gt;
&lt;br /&gt;
The Top 10 IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the top 10 internet of things vulnerabilities&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
|-  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[mailto:owasp_internet_of_things_project-request@lists.owasp.org Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/tag/podcasts/ IoT Inc]&lt;br /&gt;
* [https://soundcloud.com/craig-smith-381 IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Yunsoul</name></author>	</entry>

	</feed>