Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Fuzzing of embedded systems: A survey
Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …
Detecting vulnerability on IoT device firmware: A survey
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …
introducing vulnerabilities and novel attacks that make many companies as primary targets …
Rt-tee: Real-time system availability for cyber-physical systems using arm trustzone
Embedded devices are becoming increasingly pervasive in safety-critical systems of the
emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM …
emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM …
Your firmware has arrived: A study of firmware update vulnerabilities
Y Wu, J Wang, Y Wang, S Zhai, Z Li, Y He… - 33rd USENIX Security …, 2024 - usenix.org
Embedded devices are increasingly ubiquitous in our society. Firmware updates are one of
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …
Low-cost privilege separation with compile time compartmentalization for embedded systems
Embedded systems are pervasive and find various applications all around us. These
systems run on low-power microcontrollers with real-time constraints. Developers often …
systems run on low-power microcontrollers with real-time constraints. Developers often …
[PDF][PDF] DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing.
Concurrency use-after-free (UAF) vulnerabilities account for a large portion of UAF
vulnerabilities in Linux drivers. Many solutions have been proposed to find either …
vulnerabilities in Linux drivers. Many solutions have been proposed to find either …
Fuzzusb: Hybrid stateful fuzzing of usb gadget stacks
Universal Serial Bus (USB) is the de facto protocol supported by peripherals and mobile
devices, such as USB thumb drives and smart phones. For many devices, USB Type-C ports …
devices, such as USB thumb drives and smart phones. For many devices, USB Type-C ports …
An empirical study on concurrency bugs in interrupt-driven embedded software
C Li, R Chen, B Wang, Z Wang, T Yu, Y Jiang… - Proceedings of the …, 2023 - dl.acm.org
Interrupt-driven embedded software is widely used in aerospace, automotive electronics,
medical equipment, IoT, and other industrial fields. This type of software is usually …
medical equipment, IoT, and other industrial fields. This type of software is usually …
Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch
Unmanned Aerial Vehicles as a service (UAVaaS) has increased the field deployment of
Robotic Aerial Vehicles (RAVs) for different services such as transportation and terrain …
Robotic Aerial Vehicles (RAVs) for different services such as transportation and terrain …
{SoK}:{Where's} the {“up”?}! A Comprehensive (bottom-up) Study on the Security of Arm {Cortex-M} Systems
X Tan, Z Ma, S Pinto, L Guan, N Zhang, J Xu… - 18th USeNIX WOOT …, 2024 - usenix.org
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internet-of-Things devices. Despite the widespread usage, there has been …
embedded and Internet-of-Things devices. Despite the widespread usage, there has been …