Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML

RU Rasool, HF Ahmad, W Rafique, A Qayyum… - Journal of Network and …, 2022 - Elsevier
Abstract Internet of Medical Things (IoMT) supports traditional healthcare systems by
providing enhanced scalability, efficiency, reliability, and accuracy of healthcare services. It …

Fuzzing of embedded systems: A survey

J Yun, F Rustamov, J Kim, Y Shin - ACM Computing Surveys, 2022 - dl.acm.org
Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …

Detecting vulnerability on IoT device firmware: A survey

X Feng, X Zhu, QL Han, W Zhou… - IEEE/CAA Journal of …, 2022 - ieeexplore.ieee.org
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …

Fuzzware: Using precise {MMIO} modeling for effective firmware fuzzing

T Scharnowski, N Bars, M Schloegel… - 31st USENIX Security …, 2022 - usenix.org
As embedded devices are becoming more pervasive in our everyday lives, they turn into an
attractive target for adversaries. Despite their high value and large attack surface, applying …

Jetset: Targeted firmware rehosting for embedded systems

E Johnson, M Bland, YF Zhu, J Mason… - 30th USENIX Security …, 2021 - usenix.org
The ability to execute code in an emulator is a fundamental part of modern vulnerability
testing. Unfortunately, this poses a challenge for many embedded systems, where firmware …

Sok: Enabling security analyses of embedded systems via rehosting

A Fasano, T Ballo, M Muench, T Leek… - Proceedings of the …, 2021 - dl.acm.org
Closely monitoring the behavior of a software system during its execution enables
developers and analysts to observe, and ultimately understand, how it works. This kind of …

A taxonomy of IoT firmware security and principal firmware analysis techniques

I Nadir, H Mahmood, G Asadullah - International Journal of Critical …, 2022 - Elsevier
Abstract Internet of Things (IoT) has come a long way since its inception. However, the
standardization process in IoT systems for a secure IoT solution is still in its early days …

[HTML][HTML] Analysis of consumer IoT device vulnerability quantification frameworks

SA Baho, J Abawajy - Electronics, 2023 - mdpi.com
The increasing deployment of Internet of Things (IoT) devices in mission-critical systems has
made them more appealing to attackers. Cyberattacks on IoT devices have the potential to …

[PDF][PDF] Forming Faster Firmware Fuzzers.

L Seidel, DC Maier, M Muench - USENIX Security Symposium, 2023 - usenix.org
A recent trend for assessing the security of an embedded system's firmware is rehosting, the
art of running the firmware in a virtualized environment, rather than on the original hardware …

[HTML][HTML] Embedded fuzzing: a review of challenges, tools, and solutions

M Eisele, M Maugeri, R Shriwas, C Huth, G Bella - Cybersecurity, 2022 - Springer
Fuzzing has become one of the best-established methods to uncover software bugs.
Meanwhile, the market of embedded systems, which binds the software execution tightly to …