A survey of iot privacy security: Architecture, technology, challenges, and trends

P Sun, S Shen, Y Wan, Z Wu, Z Fang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is used in homes and hospitals and deployed outdoors to control
and report environmental changes, prevent fires, and perform many more beneficial …

Your firmware has arrived: A study of firmware update vulnerabilities

Y Wu, J Wang, Y Wang, S Zhai, Z Li, Y He… - 33rd USENIX Security …, 2024 - usenix.org
Embedded devices are increasingly ubiquitous in our society. Firmware updates are one of
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …

Greenhouse:{Single-Service} Rehosting of {Linux-Based} Firmware Binaries in {User-Space} Emulation

HJ Tay, K Zeng, JM Vadayath, AS Raj… - 32nd USENIX Security …, 2023 - usenix.org
As IoT devices grow more widespread, scaling current analysis techniques to match
becomes an increasingly critical task. Part of this challenge involves not only rehosting the …

[PDF][PDF] Forming Faster Firmware Fuzzers.

L Seidel, DC Maier, M Muench - USENIX Security Symposium, 2023 - usenix.org
A recent trend for assessing the security of an embedded system's firmware is rehosting, the
art of running the firmware in a virtualized environment, rather than on the original hardware …

{MultiFuzz}: A {Multi-Stream} Fuzzer For Testing Monolithic Firmware

M Chesser, S Nepal, DC Ranasinghe - 33rd USENIX Security …, 2024 - usenix.org
Rapid embedded device proliferation is creating new targets and opportunities for
adversaries. However, the complex interactions between firmware and hardware pose …

[HTML][HTML] IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit

W Zhou, S Shen, P Liu - Future Internet, 2025 - mdpi.com
As IoT devices with microcontroller (MCU)-based firmware become more common in our
lives, memory corruption vulnerabilities in their firmware are increasingly targeted by …

Demystifying the Security Implications in {IoT} Device Rental Services

Y He, Y Guan, R Lun, S Song, Z Guo, J Zhuge… - 33rd USENIX Security …, 2024 - usenix.org
Nowadays, unattended device rental services with cellular IoT controllers, such as e-
scooters and EV chargers, are widely deployed in public areas around the world, offering …

{SoK}:{Where's} the {“up”?}! A Comprehensive (bottom-up) Study on the Security of Arm {Cortex-M} Systems

X Tan, Z Ma, S Pinto, L Guan, N Zhang, J Xu… - 18th USeNIX WOOT …, 2024 - usenix.org
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internet-of-Things devices. Despite the widespread usage, there has been …

AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis

B Feng, M Luo, C Liu, L Lu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The security of microcontrollers, which drive modern IoT and embedded devices, continues
to raise major concerns. Within a microcontroller (MCU), the firmware is a monolithic piece of …

Where's the" up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems

X Tan, Z Ma, S Pinto, L Guan, N Zhang, J Xu… - arxiv preprint arxiv …, 2024 - arxiv.org
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internetof-Things devices. Despite the widespread usage, there has been …