Challenges in firmware re-hosting, emulation, and analysis

C Wright, WA Moeglein, S Bagchi, M Kulkarni… - ACM Computing …, 2021 - dl.acm.org
System emulation and firmware re-hosting have become popular techniques to answer
various security and performance related questions, such as determining whether a …

{HALucinator}: Firmware re-hosting through abstraction layer emulation

AA Clements, E Gustafson, T Scharnowski… - 29th USENIX Security …, 2020 - usenix.org
Given the increasing ubiquity of online embedded devices, analyzing their firmware is
important to security, privacy, and safety. The tight coupling between hardware and firmware …

Sok: Enabling security analyses of embedded systems via rehosting

A Fasano, T Ballo, M Muench, T Leek… - Proceedings of the …, 2021 - dl.acm.org
Closely monitoring the behavior of a software system during its execution enables
developers and analysts to observe, and ultimately understand, how it works. This kind of …

Greenhouse:{Single-Service} Rehosting of {Linux-Based} Firmware Binaries in {User-Space} Emulation

HJ Tay, K Zeng, JM Vadayath, AS Raj… - 32nd USENIX Security …, 2023 - usenix.org
As IoT devices grow more widespread, scaling current analysis techniques to match
becomes an increasingly critical task. Part of this challenge involves not only rehosting the …

Automatic firmware emulation through invalidity-guided knowledge inference

W Zhou, L Guan, P Liu, Y Zhang - 30th USENIX Security Symposium …, 2021 - usenix.org
Emulating firmware for microcontrollers is challenging due to the tight coupling between the
hardware and firmware. This has greatly impeded the application of dynamic analysis tools …

What your firmware tells you is not how you should emulate it: A specification-guided approach for firmware emulation

W Zhou, L Zhang, L Guan, P Liu, Y Zhang - Proceedings of the 2022 …, 2022 - dl.acm.org
Emulating firmware of microcontrollers is challenging due to the lack of peripheral models.
Existing work finds out how to respond to peripheral read operations by analyzing the target …

Automated dynamic firmware analysis at scale: a case study on embedded web interfaces

A Costin, A Zarras, A Francillon - Proceedings of the 11th ACM on Asia …, 2016 - dl.acm.org
Embedded devices are becoming more widespread, interconnected, and web-enabled than
ever. However, recent studies showed that embedded devices are far from being secure …

Jetset: Targeted firmware rehosting for embedded systems

E Johnson, M Bland, YF Zhu, J Mason… - 30th USENIX Security …, 2021 - usenix.org
The ability to execute code in an emulator is a fundamental part of modern vulnerability
testing. Unfortunately, this poses a challenge for many embedded systems, where firmware …

Firmae: Towards large-scale emulation of iot firmware for dynamic analysis

M Kim, D Kim, E Kim, S Kim, Y Jang, Y Kim - Proceedings of the 36th …, 2020 - dl.acm.org
One approach to assess the security of embedded IoT devices is applying dynamic analysis
such as fuzz testing to their firmware in scale. To this end, existing approaches aim to …

Device-agnostic firmware execution is possible: A concolic execution approach for peripheral emulation

C Cao, L Guan, J Ming, P Liu - … of the 36th Annual Computer Security …, 2020 - dl.acm.org
With the rapid proliferation of IoT devices, our cyberspace is nowadays dominated by
billions of low-cost computing nodes, which are very heterogeneous to each other. Dynamic …