LABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devices

H Liu, S Gan, C Zhang, Z Gao, H Zhang… - 2024 IEEE Symposium …, 2024 - computer.org
Fuzzing is a popular solution to finding vulnerabilities in software including IoT firmware.
However, due to the challenges of emulating or rehosting firmware, some IoT devices (eg …

Operation Mango: Scalable Discovery of {Taint-Style} Vulnerabilities in Binary Firmware Services

W Gibbs, AS Raj, JM Vadayath, HJ Tay… - 33rd USENIX Security …, 2024 - usenix.org
The rise of IoT (Internet of Things) devices has created a system of convenience, which
allows users to control and automate almost everything in their homes. But this increase in …

Pandawan: Quantifying Progress in Linux-based Firmware Rehosting

I Angelakopoulos, G Stringhini, M Egele - 33rd USENIX Security …, 2024 - usenix.org
The Internet of Things (IoT) is frequently the epicenter of cyberattacks due to its weak
security. Prior works introduce various techniques for analyzing the firmware of IoT devices …

[PDF][PDF] Faster and Better: Detecting Vulnerabilities in Linux-Based IoT Firmware with Optimized Reaching Definition Analysis

Z Gao, C Zhang, H Liu, W Sun, Z Tang… - Proceedings of the …, 2024 - ndss-symposium.org
IoT devices are often found vulnerable, ie, untrusted inputs may trigger potential
vulnerabilities and flow to sensitive operations in the firmware, which could cause severe …

[PDF][PDF] RIoTFuzzer: Companion App Assisted Remote Fuzzing for Detecting Vulnerabilities in IoT Devices

K Liu, M Yang, Z Ling, Y Zhang, C Lei… - Proceedings of the 31th …, 2024 - cse.seu.edu.cn
Due to the diversity of architectures and peripherals of Internet of Things (IoT) systems,
blackbox fuzzing stands out as a prime option for discovering vulnerabilities of IoT devices …

Corpus Christi: Establishing Replicability when Sharing the Bread is Not Allowed

R Helmke, E Padilla, N Aschenbruck - arXiv preprint arXiv:2404.11977, 2024 - arxiv.org
In this paper, we provide practical tools to improve the scientific soundness of firmware
corpora beyond the state of the art. We identify binary analysis challenges that significantly …

Complete Security Analysis on Event-Based Dynamic Protocol for Constrained IoT Device

RR Pahlevi, H Hasegawa… - … on Information and …, 2024 - ieeexplore.ieee.org
Authentication protocols have become essential for Internet of Things (IoT) devices.
Developing a secure authentication protocol has become more challenging due to the …

Securing Bluetooth Low Energy: A Literature Review

Z Wang - arXiv preprint arXiv:2404.16846, 2024 - arxiv.org
Bluetooth Low Energy (BLE) technology, operating within the widely used 2.4 GHz ISM
band, stands as a cornerstone in modern wireless communication frameworks alongside its …

[PDF][PDF] FirmDiff: Improving the Configuration of Linux Kernels Geared Towards Firmware Re-hosting

I Angelakopoulos, G Stringhini, M Egele - 2024 - ndss-symposium.org
Re-hosting Internet of Things (IoT) firmware can oftentimes be a tedious process, especially
when analysts have to intervene with the analysis to ensure further progress. When it comes …

[PDF][PDF] Accurate and Efficient Recurring Vulnerability Detection for IoT Firmware

H Xiao, Y Zhang, M Shen, C Lin, C Zhang, S Liu… - 2024 - yuanxzhang.github.io
IoT firmware faces severe threats to security vulnerabilities. As an important method to detect
vulnerabilities, recurring vulnerability detection has not been systematically studied in IoT …