Fuzzing of embedded systems: A survey

J Yun, F Rustamov, J Kim, Y Shin - ACM Computing Surveys, 2022 - dl.acm.org
Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …

A survey of protocol fuzzing

X Zhang, C Zhang, X Li, Z Du, B Mao, Y Li… - ACM Computing …, 2024 - dl.acm.org
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …

Sok: Enabling security analyses of embedded systems via rehosting

A Fasano, T Ballo, M Muench, T Leek… - Proceedings of the …, 2021 - dl.acm.org
Closely monitoring the behavior of a software system during its execution enables
developers and analysts to observe, and ultimately understand, how it works. This kind of …

[HTML][HTML] Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review

S Madan, S Sofat, D Bansal - Journal of King Saud University-Computer …, 2022 - Elsevier
IoT devices which include wireless sensors, software, actuators, and computer devices
operated through the Internet, enable the transfer of data among objects or people …

Basesafe: Baseband sanitized fuzzing through emulation

D Maier, L Seidel, S Park - Proceedings of the 13th ACM conference on …, 2020 - dl.acm.org
Rogue base stations are an effective attack vector. Cellular basebands represent a critical
part of the smartphone's security: they parse large amounts of data even before …

Learning approximate execution semantics from traces for binary function similarity

K Pei, Z Xuan, J Yang, S Jana… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Detecting semantically similar binary functions–a crucial capability with broad security
usages including vulnerability detection, malware analysis, and forensics–requires …

[PDF][PDF] FIRMWIRE: Transparent dynamic analysis for cellular baseband firmware

G Hernandez, M Muench, D Maier, A Milburn… - Network and …, 2022 - par.nsf.gov
Smartphones today leverage baseband processors to implement the multitude of cellular
protocols. Basebands execute firmware, which is responsible for decoding hundreds of …

Embedded fuzzing: a review of challenges, tools, and solutions

M Eisele, M Maugeri, R Shriwas, C Huth, G Bella - Cybersecurity, 2022 - Springer
Fuzzing has become one of the best-established methods to uncover software bugs.
Meanwhile, the market of embedded systems, which binds the software execution tightly to …

A Friend's Eye is A Good Mirror: Synthesizing {MCU} Peripheral Models from Peripheral Drivers

C Lei, Z Ling, Y Zhang, Y Yang, J Luo… - 33rd USENIX Security …, 2024 - usenix.org
The extensive integration of embedded devices within the Internet of Things (IoT) has given
rise to significant security concerns. Various initiatives have been undertaken to bolster the …

Revizor: Testing black-box CPUs against speculation contracts

O Oleksenko, C Fetzer, B Köpf… - Proceedings of the 27th …, 2022 - dl.acm.org
Speculative vulnerabilities such as Spectre and Meltdown expose speculative execution
state that can be exploited to leak information across security domains via side-channels …