Embedded fuzzing: a review of challenges, tools, and solutions
Fuzzing has become one of the best-established methods to uncover software bugs.
Meanwhile, the market of embedded systems, which binds the software execution tightly to …
Meanwhile, the market of embedded systems, which binds the software execution tightly to …
Your firmware has arrived: A study of firmware update vulnerabilities
Embedded devices are increasingly ubiquitous in our society. Firmware updates are one of
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …
{EL3XIR}: Fuzzing {COTS} Secure Monitors
ARM TrustZone forms the security backbone of mobile devices. TrustZone-based Trusted
Execution Environments (TEEs) facilitate security-sensitive tasks like user authentication …
Execution Environments (TEEs) facilitate security-sensitive tasks like user authentication …
Greenhouse:{Single-Service} Rehosting of {Linux-Based} Firmware Binaries in {User-Space} Emulation
As IoT devices grow more widespread, scaling current analysis techniques to match
becomes an increasingly critical task. Part of this challenge involves not only rehosting the …
becomes an increasingly critical task. Part of this challenge involves not only rehosting the …
A Friend's Eye is A Good Mirror: Synthesizing {MCU} Peripheral Models from Peripheral Drivers
The extensive integration of embedded devices within the Internet of Things (IoT) has given
rise to significant security concerns. Various initiatives have been undertaken to bolster the …
rise to significant security concerns. Various initiatives have been undertaken to bolster the …
[PDF][PDF] Forming Faster Firmware Fuzzers.
A recent trend for assessing the security of an embedded system's firmware is rehosting, the
art of running the firmware in a virtualized environment, rather than on the original hardware …
art of running the firmware in a virtualized environment, rather than on the original hardware …
What your firmware tells you is not how you should emulate it: A specification-guided approach for firmware emulation
Emulating firmware of microcontrollers is challenging due to the lack of peripheral models.
Existing work finds out how to respond to peripheral read operations by analyzing the target …
Existing work finds out how to respond to peripheral read operations by analyzing the target …
[PDF][PDF] FIRMWIRE: Transparent dynamic analysis for cellular baseband firmware
Smartphones today leverage baseband processors to implement the multitude of cellular
protocols. Basebands execute firmware, which is responsible for decoding hundreds of …
protocols. Basebands execute firmware, which is responsible for decoding hundreds of …
{SHiFT}: Semi-hosted Fuzz Testing for Embedded Applications
Modern microcontrollers (MCU) s are ubiquitous on critical embedded applications in the IoT
era. Therefore, securing MCU firmware is fundamental. To analyze MCU firmware security …
era. Therefore, securing MCU firmware is fundamental. To analyze MCU firmware security …
[HTML][HTML] Seeing is not always believing: Insights on IoT manufacturing from firmware composition analysis and vendor survey
M Akiyama, S Shiraishi, A Fukumoto, R Yoshimoto… - Computers & …, 2023 - Elsevier
Abstract Attacks on Internet of Things (IoT) devices have become increasingly sophisticated.
However, there exist few comprehensive security investigations of IoT devices. We …
However, there exist few comprehensive security investigations of IoT devices. We …