LABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devices
H Liu, S Gan, C Zhang, Z Gao, H Zhang… - 2024 IEEE Symposium …, 2024 - computer.org
Fuzzing is a popular solution to finding vulnerabilities in software including IoT firmware.
However, due to the challenges of emulating or rehosting firmware, some IoT devices (eg …
However, due to the challenges of emulating or rehosting firmware, some IoT devices (eg …
Operation Mango: Scalable Discovery of {Taint-Style} Vulnerabilities in Binary Firmware Services
The rise of IoT (Internet of Things) devices has created a system of convenience, which
allows users to control and automate almost everything in their homes. But this increase in …
allows users to control and automate almost everything in their homes. But this increase in …
Pandawan: Quantifying Progress in Linux-based Firmware Rehosting
The Internet of Things (IoT) is frequently the epicenter of cyberattacks due to its weak
security. Prior works introduce various techniques for analyzing the firmware of IoT devices …
security. Prior works introduce various techniques for analyzing the firmware of IoT devices …
[PDF][PDF] Faster and Better: Detecting Vulnerabilities in Linux-Based IoT Firmware with Optimized Reaching Definition Analysis
Z Gao, C Zhang, H Liu, W Sun, Z Tang… - Proceedings of the …, 2024 - ndss-symposium.org
IoT devices are often found vulnerable, ie, untrusted inputs may trigger potential
vulnerabilities and flow to sensitive operations in the firmware, which could cause severe …
vulnerabilities and flow to sensitive operations in the firmware, which could cause severe …
[PDF][PDF] RIoTFuzzer: Companion App Assisted Remote Fuzzing for Detecting Vulnerabilities in IoT Devices
Due to the diversity of architectures and peripherals of Internet of Things (IoT) systems,
blackbox fuzzing stands out as a prime option for discovering vulnerabilities of IoT devices …
blackbox fuzzing stands out as a prime option for discovering vulnerabilities of IoT devices …
Corpus Christi: Establishing Replicability when Sharing the Bread is Not Allowed
R Helmke, E Padilla, N Aschenbruck - arXiv preprint arXiv:2404.11977, 2024 - arxiv.org
In this paper, we provide practical tools to improve the scientific soundness of firmware
corpora beyond the state of the art. We identify binary analysis challenges that significantly …
corpora beyond the state of the art. We identify binary analysis challenges that significantly …
Complete Security Analysis on Event-Based Dynamic Protocol for Constrained IoT Device
RR Pahlevi, H Hasegawa… - … on Information and …, 2024 - ieeexplore.ieee.org
Authentication protocols have become essential for Internet of Things (IoT) devices.
Developing a secure authentication protocol has become more challenging due to the …
Developing a secure authentication protocol has become more challenging due to the …
Securing Bluetooth Low Energy: A Literature Review
Z Wang - arXiv preprint arXiv:2404.16846, 2024 - arxiv.org
Bluetooth Low Energy (BLE) technology, operating within the widely used 2.4 GHz ISM
band, stands as a cornerstone in modern wireless communication frameworks alongside its …
band, stands as a cornerstone in modern wireless communication frameworks alongside its …
[PDF][PDF] FirmDiff: Improving the Configuration of Linux Kernels Geared Towards Firmware Re-hosting
Re-hosting Internet of Things (IoT) firmware can oftentimes be a tedious process, especially
when analysts have to intervene with the analysis to ensure further progress. When it comes …
when analysts have to intervene with the analysis to ensure further progress. When it comes …
[PDF][PDF] Accurate and Efficient Recurring Vulnerability Detection for IoT Firmware
H Xiao, Y Zhang, M Shen, C Lin, C Zhang, S Liu… - 2024 - yuanxzhang.github.io
IoT firmware faces severe threats to security vulnerabilities. As an important method to detect
vulnerabilities, recurring vulnerability detection has not been systematically studied in IoT …
vulnerabilities, recurring vulnerability detection has not been systematically studied in IoT …