Fuzzing the internet of things: A review on the techniques and challenges for efficient vulnerability discovery in embedded systems
With a growing number of embedded devices that create, transform, and send data
autonomously at its core, the Internet of Things (IoT) is a reality in different sectors, such as …
autonomously at its core, the Internet of Things (IoT) is a reality in different sectors, such as …
Fuzzing of embedded systems: A survey
Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …
Discovering vulnerabilities in COTS IoT devices through blackbox fuzzing web management interface
A novel approach for discovering vulnerability in commercial off‐the‐shelf (COTS) IoT
devices is proposed in this paper, which will revolutionize the area. Unlike previous work …
devices is proposed in this paper, which will revolutionize the area. Unlike previous work …
[PDF][PDF] IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
With more IoT devices entering the consumer market, it becomes imperative to detect their
security vulnerabilities before an attacker does. Existing binary analysis based approaches …
security vulnerabilities before an attacker does. Existing binary analysis based approaches …
[HTML][HTML] Automated vulnerability discovery and exploitation in the Internet of Things
Z Wang, Y Zhang, Z Tian, Q Ruan, T Liu, H Wang, Z Liu… - Sensors, 2019 - mdpi.com
Recently, automated software vulnerability detection and exploitation in Internet of Things
(IoT) has attracted more and more attention, due to IoT's fast adoption and high social …
(IoT) has attracted more and more attention, due to IoT's fast adoption and high social …
Fuzzing vulnerability discovery techniques: Survey, challenges and future directions
C Beaman, M Redbourne, JD Mummery, S Hakak - Computers & Security, 2022 - Elsevier
Fuzzing is a powerful tool for vulnerability discovery in software, with much progress being
made in the field in recent years. There is limited literature available on the fuzzing …
made in the field in recent years. There is limited literature available on the fuzzing …
Diane: Identifying fuzzing triggers in apps to generate under-constrained inputs for iot devices
Internet of Things (IoT) devices have rooted themselves in the everyday life of billions of
people. Thus, researchers have applied automated bug finding techniques to improve their …
people. Thus, researchers have applied automated bug finding techniques to improve their …
Firmcorn: Vulnerability-oriented fuzzing of iot firmware via optimized virtual execution
Z Gui, H Shu, F Kang, X Xiong - Ieee Access, 2020 - ieeexplore.ieee.org
The security situation of the Internet of Things (IoT) is particularly severe, and a large
number of IoT devices are prone to vulnerabilities. In this study, we present FIRMCORN, the …
number of IoT devices are prone to vulnerabilities. In this study, we present FIRMCORN, the …
[HTML][HTML] Embedded fuzzing: a review of challenges, tools, and solutions
Fuzzing has become one of the best-established methods to uncover software bugs.
Meanwhile, the market of embedded systems, which binds the software execution tightly to …
Meanwhile, the market of embedded systems, which binds the software execution tightly to …
Discovery and identification of memory corruption vulnerabilities on bare-metal embedded devices
Memory corruption vulnerabilities remain a prevalent threat on low-cost bare-metal devices.
Fuzzing is a popular technique for automatically discovering such vulnerabilities. However …
Fuzzing is a popular technique for automatically discovering such vulnerabilities. However …