Edge computing security: State of the art and challenges

Y Xiao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

Fuzzing of embedded systems: A survey

J Yun, F Rustamov, J Kim, Y Shin - ACM Computing Surveys, 2022 - dl.acm.org
Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …

The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

{FIRM-AFL}:{High-Throughput} greybox fuzzing of {IoT} firmware via augmented process emulation

Y Zheng, A Davanian, H Yin, C Song, H Zhu… - 28th USENIX Security …, 2019 - usenix.org
Cyber attacks against IoT devices are a severe threat. These attacks exploit software
vulnerabilities in IoT firmware. Fuzzing is an effective software testing technique for finding …

Detecting vulnerability on IoT device firmware: A survey

X Feng, X Zhu, QL Han, W Zhou… - IEEE/CAA Journal of …, 2022 - ieeexplore.ieee.org
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …

Firmae: Towards large-scale emulation of iot firmware for dynamic analysis

M Kim, D Kim, E Kim, S Kim, Y Jang, Y Kim - Proceedings of the 36th …, 2020 - dl.acm.org
One approach to assess the security of embedded IoT devices is applying dynamic analysis
such as fuzz testing to their firmware in scale. To this end, existing approaches aim to …

{P2IM}: Scalable and hardware-independent firmware testing via automatic peripheral interface modeling

B Feng, A Mera, L Lu - 29th USENIX Security Symposium (USENIX …, 2020 - usenix.org
Dynamic testing or fuzzing of embedded firmware is severely limited by hardware-
dependence and poor scalability, partly contributing to the widespread vulnerable IoT …

Snipuzz: Black-box fuzzing of iot firmware via message snippet inference

X Feng, R Sun, X Zhu, M Xue, S Wen, D Liu… - Proceedings of the …, 2021 - dl.acm.org
The proliferation of Internet of Things (IoT) devices has made people's lives more
convenient, but it has also raised many security concerns. Due to the difficulty of obtaining …

{HALucinator}: Firmware re-hosting through abstraction layer emulation

AA Clements, E Gustafson, T Scharnowski… - 29th USENIX Security …, 2020 - usenix.org
Given the increasing ubiquity of online embedded devices, analyzing their firmware is
important to security, privacy, and safety. The tight coupling between hardware and firmware …

Fuzzware: Using precise {MMIO} modeling for effective firmware fuzzing

T Scharnowski, N Bars, M Schloegel… - 31st USENIX Security …, 2022 - usenix.org
As embedded devices are becoming more pervasive in our everyday lives, they turn into an
attractive target for adversaries. Despite their high value and large attack surface, applying …