Embedded fuzzing: a review of challenges, tools, and solutions

M Eisele, M Maugeri, R Shriwas, C Huth, G Bella - Cybersecurity, 2022 - Springer
Fuzzing has become one of the best-established methods to uncover software bugs.
Meanwhile, the market of embedded systems, which binds the software execution tightly to …

Your firmware has arrived: A study of firmware update vulnerabilities

Y Wu, J Wang, Y Wang, S Zhai, Z Li, Y He… - 33rd USENIX Security …, 2024 - usenix.org
Embedded devices are increasingly ubiquitous in our society. Firmware updates are one of
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …

{EL3XIR}: Fuzzing {COTS} Secure Monitors

C Lindenmeier, M Payer, M Busch - 33rd USENIX Security Symposium …, 2024 - usenix.org
ARM TrustZone forms the security backbone of mobile devices. TrustZone-based Trusted
Execution Environments (TEEs) facilitate security-sensitive tasks like user authentication …

Greenhouse:{Single-Service} Rehosting of {Linux-Based} Firmware Binaries in {User-Space} Emulation

HJ Tay, K Zeng, JM Vadayath, AS Raj… - 32nd USENIX Security …, 2023 - usenix.org
As IoT devices grow more widespread, scaling current analysis techniques to match
becomes an increasingly critical task. Part of this challenge involves not only rehosting the …

A Friend's Eye is A Good Mirror: Synthesizing {MCU} Peripheral Models from Peripheral Drivers

C Lei, Z Ling, Y Zhang, Y Yang, J Luo… - 33rd USENIX Security …, 2024 - usenix.org
The extensive integration of embedded devices within the Internet of Things (IoT) has given
rise to significant security concerns. Various initiatives have been undertaken to bolster the …

[PDF][PDF] Forming Faster Firmware Fuzzers.

L Seidel, DC Maier, M Muench - USENIX Security Symposium, 2023 - usenix.org
A recent trend for assessing the security of an embedded system's firmware is rehosting, the
art of running the firmware in a virtualized environment, rather than on the original hardware …

What your firmware tells you is not how you should emulate it: A specification-guided approach for firmware emulation

W Zhou, L Zhang, L Guan, P Liu, Y Zhang - Proceedings of the 2022 …, 2022 - dl.acm.org
Emulating firmware of microcontrollers is challenging due to the lack of peripheral models.
Existing work finds out how to respond to peripheral read operations by analyzing the target …

[PDF][PDF] FIRMWIRE: Transparent dynamic analysis for cellular baseband firmware

G Hernandez, M Muench, D Maier, A Milburn… - Network and …, 2022 - par.nsf.gov
Smartphones today leverage baseband processors to implement the multitude of cellular
protocols. Basebands execute firmware, which is responsible for decoding hundreds of …

{SHiFT}: Semi-hosted Fuzz Testing for Embedded Applications

A Mera, C Liu, R Sun, E Kirda, L Lu - 33rd USENIX Security Symposium …, 2024 - usenix.org
Modern microcontrollers (MCU) s are ubiquitous on critical embedded applications in the IoT
era. Therefore, securing MCU firmware is fundamental. To analyze MCU firmware security …

[HTML][HTML] Seeing is not always believing: Insights on IoT manufacturing from firmware composition analysis and vendor survey

M Akiyama, S Shiraishi, A Fukumoto, R Yoshimoto… - Computers & …, 2023 - Elsevier
Abstract Attacks on Internet of Things (IoT) devices have become increasingly sophisticated.
However, there exist few comprehensive security investigations of IoT devices. We …