Fuzzing of embedded systems: A survey
Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …
Demystify the fuzzing methods: A comprehensive survey
S Mallissery, YS Wu - ACM Computing Surveys, 2023 - dl.acm.org
Massive software applications possess complex data structures or parse complex data
structures; in such cases, vulnerabilities in the software become inevitable. The …
structures; in such cases, vulnerabilities in the software become inevitable. The …
Symlm: Predicting function names in stripped binaries via context-sensitive execution-aware code embeddings
Predicting function names in stripped binaries is an extremely useful but challenging task, as
it requires summarizing the execution behavior and semantics of the function in human …
it requires summarizing the execution behavior and semantics of the function in human …
Detecting vulnerability on IoT device firmware: A survey
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …
introducing vulnerabilities and novel attacks that make many companies as primary targets …
Fuzzware: Using precise {MMIO} modeling for effective firmware fuzzing
As embedded devices are becoming more pervasive in our everyday lives, they turn into an
attractive target for adversaries. Despite their high value and large attack surface, applying …
attractive target for adversaries. Despite their high value and large attack surface, applying …
物联网安全研究综述: 威胁, 检测与防御
杨毅宇, 周威, 赵尚儒, 刘聪, 张宇辉, 王鹤… - 通信 …, 2021 - infocomm-journal.com
基于近5 年网安国际会议(ACM CCS, USENIX Security, NDSS, IEEE S&P)
中发表的物联网安全文献, 以及其他部分高水平研究工作, 从威胁, 检测, 防御的视角对物联网 …
中发表的物联网安全文献, 以及其他部分高水平研究工作, 从威胁, 检测, 防御的视角对物联网 …
{EL3XIR}: Fuzzing {COTS} Secure Monitors
ARM TrustZone forms the security backbone of mobile devices. TrustZone-based Trusted
Execution Environments (TEEs) facilitate security-sensitive tasks like user authentication …
Execution Environments (TEEs) facilitate security-sensitive tasks like user authentication …
From One Thousand Pages of Specification to Unveiling Hidden Bugs: Large Language Model Assisted Fuzzing of Matter {IoT} Devices
Matter is an IoT connectivity standard backed by over two hundred companies. Since the
release of its specification in October 2022, numerous IoT devices have become Matter …
release of its specification in October 2022, numerous IoT devices have become Matter …
Towards artificial general intelligence (agi) in the internet of things (iot): Opportunities and challenges
Artificial General Intelligence (AGI), possessing the capacity to comprehend, learn, and
execute tasks with human cognitive abilities, engenders significant anticipation and intrigue …
execute tasks with human cognitive abilities, engenders significant anticipation and intrigue …
μAFL: non-intrusive feedback-driven fuzzing for microcontroller firmware
Fuzzing is one of the most effective approaches to finding software flaws. However, applying
it to microcontroller firmware incurs many challenges. For example, rehosting-based …
it to microcontroller firmware incurs many challenges. For example, rehosting-based …