GraphSPD: Graph-based security patch detection with enriched code semantics

S Wang, X Wang, K Sun, S Jajodia… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
With the increasing popularity of open-source software, embedded vulnerabilities have been
widely propagating to downstream software. Due to different maintenance policies, software …

{RapidPatch}: firmware hotpatching for {Real-Time} embedded devices

Y He, Z Zou, K Sun, Z Liu, K Xu, Q Wang… - 31st USENIX Security …, 2022 - usenix.org
Nowadays real-time embedded devices are becoming one main target of cyber attacks. A
huge number of embedded devices equipped with outdated firmware are subject to various …

Realswatt: Remote software-based attestation for embedded devices under realtime constraints

S Surminski, C Niesler, F Brasser, L Davi… - Proceedings of the …, 2021 - dl.acm.org
Smart factories, critical infrastructures, and medical devices largely rely on embedded
systems that need to satisfy realtime constraints to complete crucial tasks. Recent studies …

Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images

E Gustafson, P Grosen, N Redini, S Jha… - Proceedings of the 26th …, 2023 - dl.acm.org
In today's era of the Internet of Things, we are surrounded by security-and safety-critical,
network-connected devices. In parallel with the rise in attacks on such devices, we have also …

{ICSPatch}: Automated Vulnerability Localization and {Non-Intrusive} Hotpatching in Industrial Control Systems using Data Dependence Graphs

PHN Rajput, C Doumanidis, M Maniatakos - 32nd USENIX Security …, 2023 - usenix.org
The paradigm shift of enabling extensive intercommunication between the Operational
Technology (OT) and Information Technology (IT) devices allows vulnerabilities typical to the …

Save the Bruised Striver: A Reliable Live Patching Framework for Protecting Real-World PLCs

M Zhou, H Wang, K Li, H Zhu, L Sun - Proceedings of the Nineteenth …, 2024 - dl.acm.org
Industrial Control Systems (ICS), particularly programmable logic controllers (PLCs)
responsible for managing underlying physical infrastructures, often operate for extended …

Perils and mitigation of security risks of cooperation in mobile-as-a-gateway iot

X Zhou, J Guan, L Xing, Z Qian - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Mobile-as-a-Gateway (MaaG) is a popular feature using mobile devices as gateways to
connect IoT devices to cloud services for management. MaaG IoT access control systems …

[PDF][PDF] Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities

Y Wu, J Wang, Y Wang, S Zhai, Z Li, Y He… - USENIX Security …, 2023 - usenix.org
Embedded devices are increasingly ubiquitous in our society. Firmware updates are one of
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …

OPEC: operation-based security isolation for bare-metal embedded systems

X Zhou, J Li, W Zhang, Y Zhou, W Shen… - Proceedings of the …, 2022 - dl.acm.org
Bare-metal embedded systems usually lack security isolation. Attackers can subvert the
whole system with a single vulnerability. Previous research intends to enforce both privilege …

Where's the" up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems

X Tan, Z Ma, S Pinto, L Guan, N Zhang, J Xu… - arXiv preprint arXiv …, 2024 - arxiv.org
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internetof-Things devices. Despite the widespread usage, there has been …