diff --git a/.github/workflows/awesome-lint.yml b/.github/workflows/awesome-lint.yml index 1b86027..9b5100f 100644 --- a/.github/workflows/awesome-lint.yml +++ b/.github/workflows/awesome-lint.yml @@ -13,7 +13,4 @@ jobs: - uses: actions/checkout@v2 with: fetch-depth: 0 # fix remark-lint:awesome-git-repo-age - - name: Test awesome-lint with custom file path - uses: jthegedus/github-action-awesome-lint@68fc989d5a01aa127ce502a59f72ebe4166386f1 # commit_sha of tag v0.1.0 - with: - args: 'readme.md' + - run: 'npx awesome-lint "readme.md"' diff --git a/readme.md b/readme.md index f36caab..5e718a7 100644 --- a/readme.md +++ b/readme.md @@ -1,3 +1,4 @@ +
Awesome
@@ -8,8 +9,8 @@ > A curated list of awesome resources about embedded and IoT security. The list contains software and hardware tools, books, research papers and more. Botnets like [Mirai]() have proven that there is a need for more security in embedded and IoT devices. This list shall help beginners and experts to find helpful resources on the topic. -If you are a beginner, you should have a look at the *Books* and *Case Studies* sections. -If you want to start right away with your own analysis, you should give the *Analysis Frameworks* a try. +If you are a beginner, you should have a look at the _Books_ and _Case Studies_ sections. +If you want to start right away with your own analysis, you should give the _Analysis Frameworks_ a try. They are easy to use and you do not need to be an expert to get first meaningful results. > Items marked with :euro: are comercial products. @@ -34,6 +35,7 @@ They are easy to use and you do not need to be an expert to get first meaningful - [Websites](#websites) - [Blogs](#blogs) - [Tutorials and Technical Background](#tutorials-and-technical-background) + - [YouTube Channels](#youtube-channels) - [Conferences](#conferences) - [Contribute](#contribute) - [License](#license) @@ -145,6 +147,7 @@ Software tools for analyzing embedded/IoT devices and firmware. ## Research Papers + - 2020, Oser et al: [SAFER: Development and Evaluation of an IoT Device Risk Assessment Framework in a Multinational Organization](https://dl.acm.org/doi/abs/10.1145/3414173) - 2019, Agarwal et al: [Detecting IoT Devices and How They Put Large Heterogeneous Networks at Security Risk](https://www.mdpi.com/1424-8220/19/19/4107) - 2019, Almakhdhub et al: [BenchIoT: A Security Benchmark for the Internet of Things](https://nebelwelt.net/publications/files/19DSN.pdf) @@ -168,7 +171,7 @@ Software tools for analyzing embedded/IoT devices and firmware. ## Case Studies - + - [Binary Hardening in IoT products](https://cyber-itl.org/2019/08/26/iot-data-writeup.html) - [Cracking Linksys “Encryption”](http://www.devttys0.com/2014/02/cracking-linksys-crypto/) - [Deadly Sins Of Development](https://youtu.be/nXyglaY9N9w) - Conference talk presenting several real world examples on real bad implementations :tv:. @@ -226,6 +229,7 @@ Software tools for analyzing embedded/IoT devices and firmware. - [UART explained](https://www.mikroe.com/blog/uart-serial-communication) - An in depth explanation of the UART protocol. ### YouTube Channels + - [Flashback Team](https://www.youtube.com/c/FlashbackTeam) - A duo of hackers explaining their step by step approach to finding and exploiting vulnerabilities in embedded devices. - [StackSmashing](https://www.youtube.com/c/stacksmashing) - Reverse engineering and hardware hacking of embedded devices. @@ -233,9 +237,9 @@ Software tools for analyzing embedded/IoT devices and firmware. Conferences focused on embedded and/or IoT security. -- [Hardwear.io](https://hardwear.io/) - - EU, The Hague, September. - - USA, Santa Clara, June. +- [Hardwear.io](https://hardwear.io/) + - EU, The Hague, September. + - USA, Santa Clara, June. ## Contribute