Challenges in firmware re-hosting, emulation, and analysis
System emulation and firmware re-hosting have become popular techniques to answer
various security and performance related questions, such as determining whether a …
various security and performance related questions, such as determining whether a …
{HALucinator}: Firmware re-hosting through abstraction layer emulation
AA Clements, E Gustafson, T Scharnowski… - 29th USENIX Security …, 2020 - usenix.org
Given the increasing ubiquity of online embedded devices, analyzing their firmware is
important to security, privacy, and safety. The tight coupling between hardware and firmware …
important to security, privacy, and safety. The tight coupling between hardware and firmware …
Sok: Enabling security analyses of embedded systems via rehosting
Closely monitoring the behavior of a software system during its execution enables
developers and analysts to observe, and ultimately understand, how it works. This kind of …
developers and analysts to observe, and ultimately understand, how it works. This kind of …
Greenhouse:{Single-Service} Rehosting of {Linux-Based} Firmware Binaries in {User-Space} Emulation
As IoT devices grow more widespread, scaling current analysis techniques to match
becomes an increasingly critical task. Part of this challenge involves not only rehosting the …
becomes an increasingly critical task. Part of this challenge involves not only rehosting the …
Automatic firmware emulation through invalidity-guided knowledge inference
Emulating firmware for microcontrollers is challenging due to the tight coupling between the
hardware and firmware. This has greatly impeded the application of dynamic analysis tools …
hardware and firmware. This has greatly impeded the application of dynamic analysis tools …
What your firmware tells you is not how you should emulate it: A specification-guided approach for firmware emulation
Emulating firmware of microcontrollers is challenging due to the lack of peripheral models.
Existing work finds out how to respond to peripheral read operations by analyzing the target …
Existing work finds out how to respond to peripheral read operations by analyzing the target …
Automated dynamic firmware analysis at scale: a case study on embedded web interfaces
Embedded devices are becoming more widespread, interconnected, and web-enabled than
ever. However, recent studies showed that embedded devices are far from being secure …
ever. However, recent studies showed that embedded devices are far from being secure …
Jetset: Targeted firmware rehosting for embedded systems
The ability to execute code in an emulator is a fundamental part of modern vulnerability
testing. Unfortunately, this poses a challenge for many embedded systems, where firmware …
testing. Unfortunately, this poses a challenge for many embedded systems, where firmware …
Firmae: Towards large-scale emulation of iot firmware for dynamic analysis
One approach to assess the security of embedded IoT devices is applying dynamic analysis
such as fuzz testing to their firmware in scale. To this end, existing approaches aim to …
such as fuzz testing to their firmware in scale. To this end, existing approaches aim to …
Device-agnostic firmware execution is possible: A concolic execution approach for peripheral emulation
With the rapid proliferation of IoT devices, our cyberspace is nowadays dominated by
billions of low-cost computing nodes, which are very heterogeneous to each other. Dynamic …
billions of low-cost computing nodes, which are very heterogeneous to each other. Dynamic …