{SoK}:{Where's} the {“up”?}! A Comprehensive (bottom-up) Study on the Security of Arm {Cortex-M} Systems
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internet-of-Things devices. Despite the widespread usage, there has been …
embedded and Internet-of-Things devices. Despite the widespread usage, there has been …
Where's the" up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internetof-Things devices. Despite the widespread usage, there has been …
embedded and Internetof-Things devices. Despite the widespread usage, there has been …
Armor: Protecting Software Against Hardware Tracing Techniques
Many modern processors have embedded hardware tracing techniques (eg, Intel Processor
Trace or ARM CoreSight). While these techniques are widely used due to their transparency …
Trace or ARM CoreSight). While these techniques are widely used due to their transparency …
Efficiently Rebuilding Coverage in Hardware-Assisted Greybox Fuzzing
Coverage-based greybox fuzzing (CGF) is an efficient technique for detecting vulnerabilities,
but its coverage-feedback mechanism introduces significant overhead in binary-only …
but its coverage-feedback mechanism introduces significant overhead in binary-only …
FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization
While fuzzing has demonstrated its effectiveness in exposing vulnerabilities within
embedded firmware, the discovery of crashing test cases is only the first step in improving …
embedded firmware, the discovery of crashing test cases is only the first step in improving …
[PDF][PDF] Truman: Constructing Device Behavior Models from OS Drivers to Fuzz Virtual Devices
Virtual devices are a large attack surface of hypervisors. Vulnerabilities in virtual devices
may enable attackers to jailbreak hypervisors or even endanger co-located virtual machines …
may enable attackers to jailbreak hypervisors or even endanger co-located virtual machines …