Embedded fuzzing: a review of challenges, tools, and solutions

M Eisele, M Maugeri, R Shriwas, C Huth, G Bella - Cybersecurity, 2022 - Springer
Fuzzing has become one of the best-established methods to uncover software bugs.
Meanwhile, the market of embedded systems, which binds the software execution tightly to …

[PDF][PDF] Preventing Kernel Hacks with HAKCs.

DP McKee, Y Giannaris, C Ortega, HE Shrobe… - NDSS, 2022 - ndss-symposium.org
Commodity operating system kernels remain monolithic for practical and historical reasons.
All kernel code shares a single address space, executes with elevated processor privileges …

A Friend's Eye is A Good Mirror: Synthesizing {MCU} Peripheral Models from Peripheral Drivers

C Lei, Z Ling, Y Zhang, Y Yang, J Luo… - 33rd USENIX Security …, 2024 - usenix.org
The extensive integration of embedded devices within the Internet of Things (IoT) has given
rise to significant security concerns. Various initiatives have been undertaken to bolster the …

What your firmware tells you is not how you should emulate it: A specification-guided approach for firmware emulation

W Zhou, L Zhang, L Guan, P Liu, Y Zhang - Proceedings of the 2022 …, 2022 - dl.acm.org
Emulating firmware of microcontrollers is challenging due to the lack of peripheral models.
Existing work finds out how to respond to peripheral read operations by analyzing the target …

Aim: Automatic interrupt modeling for dynamic firmware analysis

B Feng, M Luo, C Liu, L Lu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The security of microcontrollers, which drive modern IoT and embedded devices, continues
to raise major concerns. Within a microcontroller (MCU), the firmware is a monolithic piece of …

[HTML][HTML] IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit

W Zhou, S Shen, P Liu - Future Internet, 2025 - mdpi.com
As IoT devices with microcontroller (MCU)-based firmware become more common in our
lives, memory corruption vulnerabilities in their firmware are increasingly targeted by …

Towards automated identification of layering violations in embedded applications (wip)

M Shen, JC Davis, A Machiry - Proceedings of the 24th ACM SIGPLAN …, 2023 - dl.acm.org
For portability, embedded systems software follows a layered design to reduce dependence
on particular hardware behavior. We consider the problem of identifying layering violations …

Ember-IO: Effective firmware fuzzing with model-free memory mapped IO

G Farrelly, M Chesser, DC Ranasinghe - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
Exponential growth in embedded systems is driving the research imperative to develop
fuzzers to automate firmware testing to uncover software bugs and security vulnerabilities …

SplITS: Split Input-to-State Map** for Effective Firmware Fuzzing

G Farrelly, P Quirk, SS Kanhere, S Camtepe… - … on Research in …, 2023 - Springer
Ability to test firmware on embedded devices is critical to discovering vulnerabilities prior to
their adversarial exploitation. State-of-the-art automated testing methods rehost firmware in …

Towards rehosting embedded applications as linux applications

J Srinivasan, SR Tanksalkar… - 2023 53rd Annual …, 2023 - ieeexplore.ieee.org
Dynamic analysis of embedded firmware is a necessary capability for many security tasks,
eg, vulnerability detection. Rehosting is a technique that enables dynamic analysis by …