Fuzzing the internet of things: A review on the techniques and challenges for efficient vulnerability discovery in embedded systems

M Eceiza, JL Flores, M Iturbe - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
With a growing number of embedded devices that create, transform, and send data
autonomously at its core, the Internet of Things (IoT) is a reality in different sectors, such as …

Fuzzing of embedded systems: A survey

J Yun, F Rustamov, J Kim, Y Shin - ACM Computing Surveys, 2022 - dl.acm.org
Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …

Discovering vulnerabilities in COTS IoT devices through blackbox fuzzing web management interface

D Wang, X Zhang, T Chen, J Li - Security and Communication …, 2019 - Wiley Online Library
A novel approach for discovering vulnerability in commercial off‐the‐shelf (COTS) IoT
devices is proposed in this paper, which will revolutionize the area. Unlike previous work …

[PDF][PDF] IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.

J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang… - NDSS, 2018 - staff.ie.cuhk.edu.hk
With more IoT devices entering the consumer market, it becomes imperative to detect their
security vulnerabilities before an attacker does. Existing binary analysis based approaches …

[HTML][HTML] Automated vulnerability discovery and exploitation in the Internet of Things

Z Wang, Y Zhang, Z Tian, Q Ruan, T Liu, H Wang, Z Liu… - Sensors, 2019 - mdpi.com
Recently, automated software vulnerability detection and exploitation in Internet of Things
(IoT) has attracted more and more attention, due to IoT's fast adoption and high social …

Fuzzing vulnerability discovery techniques: Survey, challenges and future directions

C Beaman, M Redbourne, JD Mummery, S Hakak - Computers & Security, 2022 - Elsevier
Fuzzing is a powerful tool for vulnerability discovery in software, with much progress being
made in the field in recent years. There is limited literature available on the fuzzing …

Diane: Identifying fuzzing triggers in apps to generate under-constrained inputs for iot devices

N Redini, A Continella, D Das… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices have rooted themselves in the everyday life of billions of
people. Thus, researchers have applied automated bug finding techniques to improve their …

Firmcorn: Vulnerability-oriented fuzzing of iot firmware via optimized virtual execution

Z Gui, H Shu, F Kang, X Xiong - Ieee Access, 2020 - ieeexplore.ieee.org
The security situation of the Internet of Things (IoT) is particularly severe, and a large
number of IoT devices are prone to vulnerabilities. In this study, we present FIRMCORN, the …

[HTML][HTML] Embedded fuzzing: a review of challenges, tools, and solutions

M Eisele, M Maugeri, R Shriwas, C Huth, G Bella - Cybersecurity, 2022 - Springer
Fuzzing has become one of the best-established methods to uncover software bugs.
Meanwhile, the market of embedded systems, which binds the software execution tightly to …

Discovery and identification of memory corruption vulnerabilities on bare-metal embedded devices

M Salehi, L Degani, M Roveri… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Memory corruption vulnerabilities remain a prevalent threat on low-cost bare-metal devices.
Fuzzing is a popular technique for automatically discovering such vulnerabilities. However …