Automatic vulnerability detection in embedded devices and firmware: Survey and layered taxonomies

A Qasem, P Shirani, M Debbabi, L Wang… - ACM Computing …, 2021 - dl.acm.org
In the era of the internet of things (IoT), software-enabled inter-connected devices are of
paramount importance. The embedded systems are very frequently used in both security …

[PDF][PDF] Discovre: Efficient cross-architecture identification of bugs in binary code.

S Eschweiler, K Yakdan, E Gerhards-Padilla - Ndss, 2016 - ndss-symposium.org
The identification of security-critical vulnerabilities is a key for protecting computer systems.
Being able to perform this process at the binary level is very important given that many …

Cross-architecture bug search in binary executables

J Pewny, B Garmany, R Gawlik… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
With the general availability of closed-source software for various CPU architectures, there is
a need to identify security-critical vulnerabilities at the binary level to perform a vulnerability …

Vulpecker: an automated vulnerability detection system based on code similarity analysis

Z Li, D Zou, S Xu, H **, H Qi, J Hu - … of the 32nd annual conference on …, 2016 - dl.acm.org
Software vulnerabilities are the fundamental cause of many attacks. Even with rapid
vulnerability patching, the problem is more complicated than it looks. One reason is that …

A survey on IoT & embedded device firmware security: architecture, extraction techniques, and vulnerability analysis frameworks

S Ul Haq, Y Singh, A Sharma, R Gupta… - Discover Internet of Things, 2023 - Springer
IoT and Embedded devices grow at an exponential rate, however, without adequate security
mechanisms in place. One of the key challenges in the cyber world is the security of these …

Automatic inference of search patterns for taint-style vulnerabilities

F Yamaguchi, A Maier, H Gascon… - 2015 IEEE Symposium …, 2015 - ieeexplore.ieee.org
Taint-style vulnerabilities are a persistent problem in software development, as the recently
discovered" Heart bleed" vulnerability strikingly illustrates. In this class of vulnerabilities …

Research on security detection technology for internet of things terminal based on firmware code genes

X Zhu, Q Li, Z Chen, G Zhang, P Shan - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) terminals have firmware with heterogeneous, closed-source, and
heavy business but light security characteristics, whereas on the edge, there are limited …

Mitigating access control vulnerabilities through interactive static analysis

J Zhu, B Chu, H Lipford, T Thomas - … of the 20th ACM Symposium on …, 2015 - dl.acm.org
Access control vulnerabilities due to programming errors have consistently ranked amongst
top software vulnerabilities. Previous research efforts have concentrated on using automatic …

An approach to clone detection in behavioural models

EP Antony, MH Alalfi, JR Cordy - 2013 20th Working …, 2013 - ieeexplore.ieee.org
In this paper we present an approach for identifying near-miss interaction clones in reverse-
engineered UML behavioural models. Our goal is to identify patterns of interaction …

Detecting privilege escalation attacks through instrumenting web application source code

J Zhu, B Chu, H Lipford - Proceedings of the 21st ACM on Symposium on …, 2016 - dl.acm.org
Privilege Escalation is a common and serious type of security attack. Although experience
shows that many applications are vulnerable to such attacks, attackers rarely succeed upon …