Fuzzing of embedded systems: A survey

J Yun, F Rustamov, J Kim, Y Shin - ACM Computing Surveys, 2022 - dl.acm.org
Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …

Detecting vulnerability on IoT device firmware: A survey

X Feng, X Zhu, QL Han, W Zhou… - IEEE/CAA Journal of …, 2022 - ieeexplore.ieee.org
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …

Rt-tee: Real-time system availability for cyber-physical systems using arm trustzone

J Wang, A Li, H Li, C Lu, N Zhang - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Embedded devices are becoming increasingly pervasive in safety-critical systems of the
emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM …

Your firmware has arrived: A study of firmware update vulnerabilities

Y Wu, J Wang, Y Wang, S Zhai, Z Li, Y He… - 33rd USENIX Security …, 2024 - usenix.org
Embedded devices are increasingly ubiquitous in our society. Firmware updates are one of
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …

Low-cost privilege separation with compile time compartmentalization for embedded systems

A Khan, D Xu, DJ Tian - 2023 IEEE Symposium on Security and …, 2023 - ieeexplore.ieee.org
Embedded systems are pervasive and find various applications all around us. These
systems run on low-power microcontrollers with real-time constraints. Developers often …

[PDF][PDF] DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing.

M Yuan, B Zhao, P Li, J Liang, X Han, X Luo… - USENIX Security …, 2023 - usenix.org
Concurrency use-after-free (UAF) vulnerabilities account for a large portion of UAF
vulnerabilities in Linux drivers. Many solutions have been proposed to find either …

Fuzzusb: Hybrid stateful fuzzing of usb gadget stacks

K Kim, T Kim, E Warraich, B Lee… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Universal Serial Bus (USB) is the de facto protocol supported by peripherals and mobile
devices, such as USB thumb drives and smart phones. For many devices, USB Type-C ports …

An empirical study on concurrency bugs in interrupt-driven embedded software

C Li, R Chen, B Wang, Z Wang, T Yu, Y Jiang… - Proceedings of the …, 2023 - dl.acm.org
Interrupt-driven embedded software is widely used in aerospace, automotive electronics,
medical equipment, IoT, and other industrial fields. This type of software is usually …

Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch

T Kim, A Ding, S Etigowni, P Sun, J Chen… - Proceedings of the 20th …, 2022 - dl.acm.org
Unmanned Aerial Vehicles as a service (UAVaaS) has increased the field deployment of
Robotic Aerial Vehicles (RAVs) for different services such as transportation and terrain …

{SoK}:{Where's} the {“up”?}! A Comprehensive (bottom-up) Study on the Security of Arm {Cortex-M} Systems

X Tan, Z Ma, S Pinto, L Guan, N Zhang, J Xu… - 18th USeNIX WOOT …, 2024 - usenix.org
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internet-of-Things devices. Despite the widespread usage, there has been …