Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML
Abstract Internet of Medical Things (IoMT) supports traditional healthcare systems by
providing enhanced scalability, efficiency, reliability, and accuracy of healthcare services. It …
providing enhanced scalability, efficiency, reliability, and accuracy of healthcare services. It …
Fuzzing of embedded systems: A survey
Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …
Detecting vulnerability on IoT device firmware: A survey
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …
introducing vulnerabilities and novel attacks that make many companies as primary targets …
Fuzzware: Using precise {MMIO} modeling for effective firmware fuzzing
As embedded devices are becoming more pervasive in our everyday lives, they turn into an
attractive target for adversaries. Despite their high value and large attack surface, applying …
attractive target for adversaries. Despite their high value and large attack surface, applying …
Jetset: Targeted firmware rehosting for embedded systems
The ability to execute code in an emulator is a fundamental part of modern vulnerability
testing. Unfortunately, this poses a challenge for many embedded systems, where firmware …
testing. Unfortunately, this poses a challenge for many embedded systems, where firmware …
Sok: Enabling security analyses of embedded systems via rehosting
Closely monitoring the behavior of a software system during its execution enables
developers and analysts to observe, and ultimately understand, how it works. This kind of …
developers and analysts to observe, and ultimately understand, how it works. This kind of …
A taxonomy of IoT firmware security and principal firmware analysis techniques
Abstract Internet of Things (IoT) has come a long way since its inception. However, the
standardization process in IoT systems for a secure IoT solution is still in its early days …
standardization process in IoT systems for a secure IoT solution is still in its early days …
[HTML][HTML] Analysis of consumer IoT device vulnerability quantification frameworks
SA Baho, J Abawajy - Electronics, 2023 - mdpi.com
The increasing deployment of Internet of Things (IoT) devices in mission-critical systems has
made them more appealing to attackers. Cyberattacks on IoT devices have the potential to …
made them more appealing to attackers. Cyberattacks on IoT devices have the potential to …
[PDF][PDF] Forming Faster Firmware Fuzzers.
A recent trend for assessing the security of an embedded system's firmware is rehosting, the
art of running the firmware in a virtualized environment, rather than on the original hardware …
art of running the firmware in a virtualized environment, rather than on the original hardware …
[HTML][HTML] Embedded fuzzing: a review of challenges, tools, and solutions
Fuzzing has become one of the best-established methods to uncover software bugs.
Meanwhile, the market of embedded systems, which binds the software execution tightly to …
Meanwhile, the market of embedded systems, which binds the software execution tightly to …