Detecting vulnerability on IoT device firmware: A survey
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …
introducing vulnerabilities and novel attacks that make many companies as primary targets …
UCRF: Static analyzing firmware to generate under-constrained seed for fuzzing SOHO router
SOHO (small office and home office) routers are the key elements of the IoT, providing
network services for various smart devices. Recent years have seen increased attacks …
network services for various smart devices. Recent years have seen increased attacks …
Code vulnerability detection based on deep sequence and graph models: A survey
With the flourishing of the open‐source software community, the problem of software
vulnerabilities is becoming more and more serious. Hence, it is urgent to come up with an …
vulnerabilities is becoming more and more serious. Hence, it is urgent to come up with an …
Sharing more and checking less: Leveraging common input keywords to detect bugs in embedded systems
IoT devices have brought invaluable convenience to our daily life. However, their
pervasiveness also amplifies the impact of security vulnerabilities. Many popular …
pervasiveness also amplifies the impact of security vulnerabilities. Many popular …
Sfuzz: Slice-based fuzzing for real-time operating systems
Real-Time Operating System (RTOS) has become the main category of embedded systems.
It is widely used to support tasks requiring real-time response such as printers and switches …
It is widely used to support tasks requiring real-time response such as printers and switches …
Leveraging semantic relations in code and data to enhance taint analysis of embedded systems
IoT devices have significantly impacted our daily lives, and detecting vulnerabilities in
embedded systems early on is critical for ensuring their security. Among the existing …
embedded systems early on is critical for ensuring their security. Among the existing …
LABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devices
H Liu, S Gan, C Zhang, Z Gao, H Zhang… - 2024 IEEE Symposium …, 2024 - computer.org
Fuzzing is a popular solution to finding vulnerabilities in software including IoT firmware.
However, due to the challenges of emulating or rehosting firmware, some IoT devices (eg …
However, due to the challenges of emulating or rehosting firmware, some IoT devices (eg …
Exposed by default: A security analysis of home router default settings
With ubiquitous Internet connectivity, home routers have become a cornerstone of our digital
lives, often deployed with minimal changes to the factory default settings. However, if left …
lives, often deployed with minimal changes to the factory default settings. However, if left …
NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices
Y Zhang, N Zhong, W You, Y Zou, K Jian, J Xu, J Sun… - Cybersecurity, 2022 - Springer
Network function virtualization provides programmable in-network middlewares by
leveraging virtualization technologies and commodity hardware and has gained popularity …
leveraging virtualization technologies and commodity hardware and has gained popularity …
Z-Fuzzer: device-agnostic fuzzing of Zigbee protocol implementation
With the proliferation of the Internet of Things (IoT) devices, Zigbee is widely adopted as a
resource-efficient wireless protocol. Recently, severe vulnerabilities in Zigbee protocol …
resource-efficient wireless protocol. Recently, severe vulnerabilities in Zigbee protocol …