diff --git a/.github/workflows/awesome-lint.yml b/.github/workflows/awesome-lint.yml
index 1b86027..9b5100f 100644
--- a/.github/workflows/awesome-lint.yml
+++ b/.github/workflows/awesome-lint.yml
@@ -13,7 +13,4 @@ jobs:
- uses: actions/checkout@v2
with:
fetch-depth: 0 # fix remark-lint:awesome-git-repo-age
- - name: Test awesome-lint with custom file path
- uses: jthegedus/github-action-awesome-lint@68fc989d5a01aa127ce502a59f72ebe4166386f1 # commit_sha of tag v0.1.0
- with:
- args: 'readme.md'
+ - run: 'npx awesome-lint "readme.md"'
diff --git a/readme.md b/readme.md
index f36caab..5e718a7 100644
--- a/readme.md
+++ b/readme.md
@@ -1,3 +1,4 @@
+
@@ -8,8 +9,8 @@
> A curated list of awesome resources about embedded and IoT security. The list contains software and hardware tools, books, research papers and more.
Botnets like [Mirai](
) have proven that there is a need for more security in embedded and IoT devices. This list shall help beginners and experts to find helpful resources on the topic.
-If you are a beginner, you should have a look at the *Books* and *Case Studies* sections.
-If you want to start right away with your own analysis, you should give the *Analysis Frameworks* a try.
+If you are a beginner, you should have a look at the _Books_ and _Case Studies_ sections.
+If you want to start right away with your own analysis, you should give the _Analysis Frameworks_ a try.
They are easy to use and you do not need to be an expert to get first meaningful results.
> Items marked with :euro: are comercial products.
@@ -34,6 +35,7 @@ They are easy to use and you do not need to be an expert to get first meaningful
- [Websites](#websites)
- [Blogs](#blogs)
- [Tutorials and Technical Background](#tutorials-and-technical-background)
+ - [YouTube Channels](#youtube-channels)
- [Conferences](#conferences)
- [Contribute](#contribute)
- [License](#license)
@@ -145,6 +147,7 @@ Software tools for analyzing embedded/IoT devices and firmware.
## Research Papers
+
- 2020, Oser et al: [SAFER: Development and Evaluation of an IoT Device Risk Assessment Framework in a Multinational Organization](https://dl.acm.org/doi/abs/10.1145/3414173)
- 2019, Agarwal et al: [Detecting IoT Devices and How They Put Large Heterogeneous Networks at Security Risk](https://www.mdpi.com/1424-8220/19/19/4107)
- 2019, Almakhdhub et al: [BenchIoT: A Security Benchmark for the Internet of Things](https://nebelwelt.net/publications/files/19DSN.pdf)
@@ -168,7 +171,7 @@ Software tools for analyzing embedded/IoT devices and firmware.
## Case Studies
-
+
- [Binary Hardening in IoT products](https://cyber-itl.org/2019/08/26/iot-data-writeup.html)
- [Cracking Linksys “Encryption”](http://www.devttys0.com/2014/02/cracking-linksys-crypto/)
- [Deadly Sins Of Development](https://youtu.be/nXyglaY9N9w) - Conference talk presenting several real world examples on real bad implementations :tv:.
@@ -226,6 +229,7 @@ Software tools for analyzing embedded/IoT devices and firmware.
- [UART explained](https://www.mikroe.com/blog/uart-serial-communication) - An in depth explanation of the UART protocol.
### YouTube Channels
+
- [Flashback Team](https://www.youtube.com/c/FlashbackTeam) - A duo of hackers explaining their step by step approach to finding and exploiting vulnerabilities in embedded devices.
- [StackSmashing](https://www.youtube.com/c/stacksmashing) - Reverse engineering and hardware hacking of embedded devices.
@@ -233,9 +237,9 @@ Software tools for analyzing embedded/IoT devices and firmware.
Conferences focused on embedded and/or IoT security.
-- [Hardwear.io](https://hardwear.io/)
- - EU, The Hague, September.
- - USA, Santa Clara, June.
+- [Hardwear.io](https://hardwear.io/)
+ - EU, The Hague, September.
+ - USA, Santa Clara, June.
## Contribute