1. National Institute of Standards and Technology (NIST). (2020). IoT Device Cybersecurity Capability Core Baseline (NISTIR 8259A).
Reference: Section 3.2.3
"Data Protection
" Capability: "The device can protect the data it stores from unauthorized access and modification." The discussion notes emphasize protecting sensitive data stored on the device
such as keys and credentials. Storing a private key in unsecure flash violates this core capability.
2. OWASP Foundation. (2018). OWASP Internet of Things Top 10 - 2018.
Reference: Section "I5 - Insecure Data Storage." This document explicitly lists "private keys" as sensitive information that is often stored insecurely on IoT devices or in their mobile applications. The document states that a lack of encryption or access control for this data is a primary cause of compromise.
3. Purdue University. (n.d.). ECE 565: Computer and Network Security - Lecture 15: Embedded Systems Security.
Reference: Course lecture slides on Embedded Systems Security. The material discusses threats to embedded systems
including the extraction of cryptographic keys from non-volatile memory (flash). It highlights that if keys are not protected by a hardware security module (HSM) or secure element
they are vulnerable to physical and software-based extraction attacks.