Edge computing security: State of the art and challenges
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …
years have been dramatically incentivizing the advancement of edge computing. On the one …
Fuzzing of embedded systems: A survey
Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …
The art, science, and engineering of fuzzing: A survey
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
{FIRM-AFL}:{High-Throughput} greybox fuzzing of {IoT} firmware via augmented process emulation
Cyber attacks against IoT devices are a severe threat. These attacks exploit software
vulnerabilities in IoT firmware. Fuzzing is an effective software testing technique for finding …
vulnerabilities in IoT firmware. Fuzzing is an effective software testing technique for finding …
Detecting vulnerability on IoT device firmware: A survey
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …
introducing vulnerabilities and novel attacks that make many companies as primary targets …
Sok: Prudent evaluation practices for fuzzing
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past
decade. After AFL popularized the groundbreaking concept of lightweight coverage …
decade. After AFL popularized the groundbreaking concept of lightweight coverage …
Firmae: Towards large-scale emulation of iot firmware for dynamic analysis
One approach to assess the security of embedded IoT devices is applying dynamic analysis
such as fuzz testing to their firmware in scale. To this end, existing approaches aim to …
such as fuzz testing to their firmware in scale. To this end, existing approaches aim to …
{P2IM}: Scalable and hardware-independent firmware testing via automatic peripheral interface modeling
Dynamic testing or fuzzing of embedded firmware is severely limited by hardware-
dependence and poor scalability, partly contributing to the widespread vulnerable IoT …
dependence and poor scalability, partly contributing to the widespread vulnerable IoT …
Snipuzz: Black-box fuzzing of iot firmware via message snippet inference
The proliferation of Internet of Things (IoT) devices has made people's lives more
convenient, but it has also raised many security concerns. Due to the difficulty of obtaining …
convenient, but it has also raised many security concerns. Due to the difficulty of obtaining …
{HALucinator}: Firmware re-hosting through abstraction layer emulation
Given the increasing ubiquity of online embedded devices, analyzing their firmware is
important to security, privacy, and safety. The tight coupling between hardware and firmware …
important to security, privacy, and safety. The tight coupling between hardware and firmware …