{SoK}:{Where's} the {“up”?}! A Comprehensive (bottom-up) Study on the Security of Arm {Cortex-M} Systems

X Tan, Z Ma, S Pinto, L Guan, N Zhang, J Xu… - 18th USeNIX WOOT …, 2024 - usenix.org
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internet-of-Things devices. Despite the widespread usage, there has been …

Where's the" up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems

X Tan, Z Ma, S Pinto, L Guan, N Zhang, J Xu… - arxiv preprint arxiv …, 2024 - arxiv.org
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internetof-Things devices. Despite the widespread usage, there has been …

Armor: Protecting Software Against Hardware Tracing Techniques

T Yue, F Zhang, Z Ning, P Wang, X Zhou… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Many modern processors have embedded hardware tracing techniques (eg, Intel Processor
Trace or ARM CoreSight). While these techniques are widely used due to their transparency …

Efficiently Rebuilding Coverage in Hardware-Assisted Greybox Fuzzing

T Yue, Y **, F Zhang, Z Ning, P Wang… - Proceedings of the 27th …, 2024 - dl.acm.org
Coverage-based greybox fuzzing (CGF) is an efficient technique for detecting vulnerabilities,
but its coverage-feedback mechanism introduces significant overhead in binary-only …

FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization

B Chang, B Zhao, Q Zhang, P Liu, Y Tian… - arxiv preprint arxiv …, 2024 - arxiv.org
While fuzzing has demonstrated its effectiveness in exposing vulnerabilities within
embedded firmware, the discovery of crashing test cases is only the first step in improving …

[PDF][PDF] Truman: Constructing Device Behavior Models from OS Drivers to Fuzz Virtual Devices

Z Ma, Q Liu, Z Li, T Yin, W Tan, C Zhang, M Payer - hexhive.epfl.ch
Virtual devices are a large attack surface of hypervisors. Vulnerabilities in virtual devices
may enable attackers to jailbreak hypervisors or even endanger co-located virtual machines …