Fuzzing of embedded systems: A survey

J Yun, F Rustamov, J Kim, Y Shin - ACM Computing Surveys, 2022 - dl.acm.org
Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …

[HTML][HTML] A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain

H Pourrahmani, A Yavarinasab, AMH Monazzah - Internet of Things, 2023 - Elsevier
The current advances in the Internet of Things (IoT) and the solutions being offered by this
technology have accounted IoT among the top ten technologies that will transform the global …

Detecting vulnerability on IoT device firmware: A survey

X Feng, X Zhu, QL Han, W Zhou… - IEEE/CAA Journal of …, 2022 - ieeexplore.ieee.org
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …

Snipuzz: Black-box fuzzing of iot firmware via message snippet inference

X Feng, R Sun, X Zhu, M Xue, S Wen, D Liu… - Proceedings of the …, 2021 - dl.acm.org
The proliferation of Internet of Things (IoT) devices has made people's lives more
convenient, but it has also raised many security concerns. Due to the difficulty of obtaining …

Your firmware has arrived: A study of firmware update vulnerabilities

Y Wu, J Wang, Y Wang, S Zhai, Z Li, Y He… - 33rd USENIX Security …, 2024 - usenix.org
Embedded devices are increasingly ubiquitous in our society. Firmware updates are one of
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …

Diane: Identifying fuzzing triggers in apps to generate under-constrained inputs for iot devices

N Redini, A Continella, D Das… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices have rooted themselves in the everyday life of billions of
people. Thus, researchers have applied automated bug finding techniques to improve their …

Challenges in firmware re-hosting, emulation, and analysis

C Wright, WA Moeglein, S Bagchi, M Kulkarni… - ACM Computing …, 2021 - dl.acm.org
System emulation and firmware re-hosting have become popular techniques to answer
various security and performance related questions, such as determining whether a …

Sok: Enabling security analyses of embedded systems via rehosting

A Fasano, T Ballo, M Muench, T Leek… - Proceedings of the …, 2021 - dl.acm.org
Closely monitoring the behavior of a software system during its execution enables
developers and analysts to observe, and ultimately understand, how it works. This kind of …

Sharing more and checking less: Leveraging common input keywords to detect bugs in embedded systems

L Chen, Y Wang, Q Cai, Y Zhan, H Hu… - 30th USENIX Security …, 2021 - usenix.org
IoT devices have brought invaluable convenience to our daily life. However, their
pervasiveness also amplifies the impact of security vulnerabilities. Many popular …

Harnessing the power of llm to support binary taint analysis

P Liu, C Sun, Y Zheng, X Feng, C Qin, Y Wang… - arxiv preprint arxiv …, 2023 - arxiv.org
This paper proposes LATTE, the first static binary taint analysis that is powered by a large
language model (LLM). LATTE is superior to the state of the art (eg, Emtaint, Arbiter …