Detecting vulnerability on IoT device firmware: A survey

X Feng, X Zhu, QL Han, W Zhou… - IEEE/CAA Journal of …, 2022 - ieeexplore.ieee.org
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …

UCRF: Static analyzing firmware to generate under-constrained seed for fuzzing SOHO router

C Qin, J Peng, P Liu, Y Zheng, K Cheng, W Zhang… - Computers & …, 2023 - Elsevier
SOHO (small office and home office) routers are the key elements of the IoT, providing
network services for various smart devices. Recent years have seen increased attacks …

Code vulnerability detection based on deep sequence and graph models: A survey

B Wu, F Zou - Security and Communication Networks, 2022 - Wiley Online Library
With the flourishing of the open‐source software community, the problem of software
vulnerabilities is becoming more and more serious. Hence, it is urgent to come up with an …

Sharing more and checking less: Leveraging common input keywords to detect bugs in embedded systems

L Chen, Y Wang, Q Cai, Y Zhan, H Hu… - 30th USENIX Security …, 2021 - usenix.org
IoT devices have brought invaluable convenience to our daily life. However, their
pervasiveness also amplifies the impact of security vulnerabilities. Many popular …

Sfuzz: Slice-based fuzzing for real-time operating systems

L Chen, Q Cai, Z Ma, Y Wang, H Hu, M Shen… - Proceedings of the …, 2022 - dl.acm.org
Real-Time Operating System (RTOS) has become the main category of embedded systems.
It is widely used to support tasks requiring real-time response such as printers and switches …

Leveraging semantic relations in code and data to enhance taint analysis of embedded systems

J Zhao, Y Li, Y Zou, Z Liang, Y **ao, Y Li… - 33rd USENIX Security …, 2024 - usenix.org
IoT devices have significantly impacted our daily lives, and detecting vulnerabilities in
embedded systems early on is critical for ensuring their security. Among the existing …

LABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devices

H Liu, S Gan, C Zhang, Z Gao, H Zhang… - 2024 IEEE Symposium …, 2024 - computer.org
Fuzzing is a popular solution to finding vulnerabilities in software including IoT firmware.
However, due to the challenges of emulating or rehosting firmware, some IoT devices (eg …

Exposed by default: A security analysis of home router default settings

J Ye, XDC De Carnavalet, L Zhao, M Zhang… - Proceedings of the 19th …, 2024 - dl.acm.org
With ubiquitous Internet connectivity, home routers have become a cornerstone of our digital
lives, often deployed with minimal changes to the factory default settings. However, if left …

NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices

Y Zhang, N Zhong, W You, Y Zou, K Jian, J Xu, J Sun… - Cybersecurity, 2022 - Springer
Network function virtualization provides programmable in-network middlewares by
leveraging virtualization technologies and commodity hardware and has gained popularity …

Z-Fuzzer: device-agnostic fuzzing of Zigbee protocol implementation

M Ren, X Ren, H Feng, J Ming, Y Lei - … of the 14th ACM Conference on …, 2021 - dl.acm.org
With the proliferation of the Internet of Things (IoT) devices, Zigbee is widely adopted as a
resource-efficient wireless protocol. Recently, severe vulnerabilities in Zigbee protocol …