Demystify the fuzzing methods: A comprehensive survey
S Mallissery, YS Wu - ACM Computing Surveys, 2023 - dl.acm.org
Massive software applications possess complex data structures or parse complex data
structures; in such cases, vulnerabilities in the software become inevitable. The …
structures; in such cases, vulnerabilities in the software become inevitable. The …
A Review of IoT Firmware Vulnerabilities and Auditing Techniques
In recent years, the Internet of Things (IoT) paradigm has been widely applied across a
variety of industrial and consumer areas to facilitate greater automation and increase …
variety of industrial and consumer areas to facilitate greater automation and increase …
Detecting vulnerability on IoT device firmware: A survey
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …
introducing vulnerabilities and novel attacks that make many companies as primary targets …
Automatic firmware emulation through invalidity-guided knowledge inference
Emulating firmware for microcontrollers is challenging due to the tight coupling between the
hardware and firmware. This has greatly impeded the application of dynamic analysis tools …
hardware and firmware. This has greatly impeded the application of dynamic analysis tools …
Sok: Enabling security analyses of embedded systems via rehosting
Closely monitoring the behavior of a software system during its execution enables
developers and analysts to observe, and ultimately understand, how it works. This kind of …
developers and analysts to observe, and ultimately understand, how it works. This kind of …
μAFL: non-intrusive feedback-driven fuzzing for microcontroller firmware
Fuzzing is one of the most effective approaches to finding software flaws. However, applying
it to microcontroller firmware incurs many challenges. For example, rehosting-based …
it to microcontroller firmware incurs many challenges. For example, rehosting-based …
Greenhouse:{Single-Service} Rehosting of {Linux-Based} Firmware Binaries in {User-Space} Emulation
As IoT devices grow more widespread, scaling current analysis techniques to match
becomes an increasingly critical task. Part of this challenge involves not only rehosting the …
becomes an increasingly critical task. Part of this challenge involves not only rehosting the …
A Friend's Eye is A Good Mirror: Synthesizing {MCU} Peripheral Models from Peripheral Drivers
The extensive integration of embedded devices within the Internet of Things (IoT) has given
rise to significant security concerns. Various initiatives have been undertaken to bolster the …
rise to significant security concerns. Various initiatives have been undertaken to bolster the …
[PDF][PDF] Forming Faster Firmware Fuzzers.
A recent trend for assessing the security of an embedded system's firmware is rehosting, the
art of running the firmware in a virtualized environment, rather than on the original hardware …
art of running the firmware in a virtualized environment, rather than on the original hardware …
What your firmware tells you is not how you should emulate it: A specification-guided approach for firmware emulation
Emulating firmware of microcontrollers is challenging due to the lack of peripheral models.
Existing work finds out how to respond to peripheral read operations by analyzing the target …
Existing work finds out how to respond to peripheral read operations by analyzing the target …