Fuzzing of embedded systems: A survey

J Yun, F Rustamov, J Kim, Y Shin - ACM Computing Surveys, 2022 - dl.acm.org
Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …

A review of IoT firmware vulnerabilities and auditing techniques

T Bakhshi, B Ghita, I Kuzminykh - Sensors, 2024 - mdpi.com
In recent years, the Internet of Things (IoT) paradigm has been widely applied across a
variety of industrial and consumer areas to facilitate greater automation and increase …

Detecting vulnerability on IoT device firmware: A survey

X Feng, X Zhu, QL Han, W Zhou… - IEEE/CAA Journal of …, 2022 - ieeexplore.ieee.org
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …

The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved

W Zhou, Y Jia, A Peng, Y Zhang… - IEEE Internet of things …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) is an increasingly popular technology that enables physical devices,
vehicles, home appliances, etc., to communicate and even inter operate with one another. It …

[PDF][PDF] IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.

J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang… - NDSS, 2018 - staff.ie.cuhk.edu.hk
With more IoT devices entering the consumer market, it becomes imperative to detect their
security vulnerabilities before an attacker does. Existing binary analysis based approaches …

IoT security: ongoing challenges and research opportunities

ZK Zhang, MCY Cho, CW Wang… - 2014 IEEE 7th …, 2014 - ieeexplore.ieee.org
The Internet of Things (IoT) opens opportunities for wearable devices, home appliances, and
software to share and communicate information on the Internet. Given that the shared data …

[PDF][PDF] Towards automated dynamic analysis for linux-based embedded firmware.

DD Chen, M Woo, D Brumley, M Egele - NDSS, 2016 - ndss-symposium.org
Commercial-off-the-shelf (COTS) network-enabled embedded devices are usually controlled
by vendor firmware to perform integral functions in our daily lives. For example, wireless …

{P2IM}: Scalable and hardware-independent firmware testing via automatic peripheral interface modeling

B Feng, A Mera, L Lu - 29th USENIX Security Symposium (USENIX …, 2020 - usenix.org
Dynamic testing or fuzzing of embedded firmware is severely limited by hardware-
dependence and poor scalability, partly contributing to the widespread vulnerable IoT …

[PDF][PDF] Firmalice-automatic detection of authentication bypass vulnerabilities in binary firmware.

Y Shoshitaishvili, R Wang, C Hauser, C Kruegel… - NDSS, 2015 - ndss-symposium.org
Embedded devices have become ubiquitous, and they are used in a range of privacy-
sensitive and security-critical applications. Most of these devices run proprietary software …

A {Large-scale} analysis of the security of embedded firmwares

A Costin, J Zaddach, A Francillon… - 23rd USENIX security …, 2014 - usenix.org
As embedded systems are more than ever present in our society, their security is becoming
an increasingly important issue. However, based on the results of many recent analyses of …