College - Author 1

College of Engineering

Department - Author 1

Computer Science Department

Advisor

Bruce DeBruhl, College of Engineering, Computer Engineering Department and Computer Science & Software Engineering Department; BJ Klingenberg, College of Engineering, Computer Science & Software Engineering Department

Funding Source

The Noyce School of Applied Computing; the College of Engineering; DeBruhl Professional Development

Acknowledgements

Professors DeBruhl and Klingenberg

Date

10-2024

Abstract/Summary

The rapid expansion of the Internet of Things (IoT) has revolutionized industries by enabling connected smart devices to monitor, communicate, and automate tasks in real-time. Central to the functioning of many IoT systems are microcontrollers like the ESP32, a versatile and low-cost microcontroller known for its integrated Wi-Fi and Bluetooth capabilities. The ESP32's powerful processing, energy efficiency, and adaptability make it a popular choice for IoT applications ranging from smart home devices to industrial automation. However, as IoT adoption grows, so too do the security challenges posed by vulnerabilities in these devices, particularly within ESP32-based systems. For this project, I explored different vulnerabilities and malware attacks on the ESP32 microchip.

Share

COinS
 

URL: https://digitalcommons.calpoly.edu/ceng_surp/63

 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.