[HTML][HTML] Embedded fuzzing: a review of challenges, tools, and solutions

M Eisele, M Maugeri, R Shriwas, C Huth, G Bella - Cybersecurity, 2022 - Springer
Fuzzing has become one of the best-established methods to uncover software bugs.
Meanwhile, the market of embedded systems, which binds the software execution tightly to …

{P2IM}: Scalable and hardware-independent firmware testing via automatic peripheral interface modeling

B Feng, A Mera, L Lu - 29th USENIX Security Symposium (USENIX …, 2020 - usenix.org
Dynamic testing or fuzzing of embedded firmware is severely limited by hardware-
dependence and poor scalability, partly contributing to the widespread vulnerable IoT …

Fuzzware: Using precise {MMIO} modeling for effective firmware fuzzing

T Scharnowski, N Bars, M Schloegel… - 31st USENIX Security …, 2022 - usenix.org
As embedded devices are becoming more pervasive in our everyday lives, they turn into an
attractive target for adversaries. Despite their high value and large attack surface, applying …

Automatic firmware emulation through invalidity-guided knowledge inference

W Zhou, L Guan, P Liu, Y Zhang - 30th USENIX Security Symposium …, 2021 - usenix.org
Emulating firmware for microcontrollers is challenging due to the tight coupling between the
hardware and firmware. This has greatly impeded the application of dynamic analysis tools …

{StateFuzz}: System {Call-Based}{State-Aware} linux driver fuzzing

B Zhao, Z Li, S Qin, Z Ma, M Yuan, W Zhu… - 31st USENIX Security …, 2022 - usenix.org
Coverage-guided fuzzing has achieved great success in finding software vulnerabilities.
Existing coverage-guided fuzzers generally favor test cases that hit new code, and discard …

DICE: Automatic emulation of DMA input channels for dynamic firmware analysis

A Mera, B Feng, L Lu, E Kirda - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Microcontroller-based embedded devices are at the core of Internet-of-Things (IoT) and
Cyber-Physical Systems (CPS). The security of these devices is of paramount importance …

Device-agnostic firmware execution is possible: A concolic execution approach for peripheral emulation

C Cao, L Guan, J Ming, P Liu - … of the 36th Annual Computer Security …, 2020 - dl.acm.org
With the rapid proliferation of IoT devices, our cyberspace is nowadays dominated by
billions of low-cost computing nodes, which are very heterogeneous to each other. Dynamic …

Syzdescribe: Principled, automated, static generation of syscall descriptions for kernel drivers

Y Hao, G Li, X Zou, W Chen, S Zhu… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Fuzz testing operating system kernels has been effective overall in recent years. For
example, syzkaller manages to find thousands of bugs in the Linux kernel since 2017. One …

Agamotto: Accelerating kernel driver fuzzing with lightweight virtual machine checkpoints

D Song, F Hetzelt, J Kim, BB Kang, JP Seifert… - 29th USENIX Security …, 2020 - usenix.org
Kernel-mode drivers are challenging to analyze for vulnerabilities, yet play a critical role in
maintaining the security of OS kernels. Their wide attack surface, exposed via both the …

[PDF][PDF] Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.

ST Dinh, H Cho, K Martin, A Oest, K Zeng… - NDSS, 2021 - adamdoupe.com
JavaScript runtime systems include some specialized programming interfaces, called
binding layers. Binding layers translate data representations between JavaScript and unsafe …