A survey of iot privacy security: Architecture, technology, challenges, and trends
P Sun, S Shen, Y Wan, Z Wu, Z Fang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is used in homes and hospitals and deployed outdoors to control
and report environmental changes, prevent fires, and perform many more beneficial …
and report environmental changes, prevent fires, and perform many more beneficial …
Your firmware has arrived: A study of firmware update vulnerabilities
Embedded devices are increasingly ubiquitous in our society. Firmware updates are one of
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …
Greenhouse:{Single-Service} Rehosting of {Linux-Based} Firmware Binaries in {User-Space} Emulation
As IoT devices grow more widespread, scaling current analysis techniques to match
becomes an increasingly critical task. Part of this challenge involves not only rehosting the …
becomes an increasingly critical task. Part of this challenge involves not only rehosting the …
[PDF][PDF] Forming Faster Firmware Fuzzers.
A recent trend for assessing the security of an embedded system's firmware is rehosting, the
art of running the firmware in a virtualized environment, rather than on the original hardware …
art of running the firmware in a virtualized environment, rather than on the original hardware …
{MultiFuzz}: A {Multi-Stream} Fuzzer For Testing Monolithic Firmware
Rapid embedded device proliferation is creating new targets and opportunities for
adversaries. However, the complex interactions between firmware and hardware pose …
adversaries. However, the complex interactions between firmware and hardware pose …
[HTML][HTML] IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit
As IoT devices with microcontroller (MCU)-based firmware become more common in our
lives, memory corruption vulnerabilities in their firmware are increasingly targeted by …
lives, memory corruption vulnerabilities in their firmware are increasingly targeted by …
Demystifying the Security Implications in {IoT} Device Rental Services
Y He, Y Guan, R Lun, S Song, Z Guo, J Zhuge… - 33rd USENIX Security …, 2024 - usenix.org
Nowadays, unattended device rental services with cellular IoT controllers, such as e-
scooters and EV chargers, are widely deployed in public areas around the world, offering …
scooters and EV chargers, are widely deployed in public areas around the world, offering …
{SoK}:{Where's} the {“up”?}! A Comprehensive (bottom-up) Study on the Security of Arm {Cortex-M} Systems
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internet-of-Things devices. Despite the widespread usage, there has been …
embedded and Internet-of-Things devices. Despite the widespread usage, there has been …
AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis
The security of microcontrollers, which drive modern IoT and embedded devices, continues
to raise major concerns. Within a microcontroller (MCU), the firmware is a monolithic piece of …
to raise major concerns. Within a microcontroller (MCU), the firmware is a monolithic piece of …
Where's the" up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internetof-Things devices. Despite the widespread usage, there has been …
embedded and Internetof-Things devices. Despite the widespread usage, there has been …