GraphSPD: Graph-based security patch detection with enriched code semantics
With the increasing popularity of open-source software, embedded vulnerabilities have been
widely propagating to downstream software. Due to different maintenance policies, software …
widely propagating to downstream software. Due to different maintenance policies, software …
{RapidPatch}: firmware hotpatching for {Real-Time} embedded devices
Nowadays real-time embedded devices are becoming one main target of cyber attacks. A
huge number of embedded devices equipped with outdated firmware are subject to various …
huge number of embedded devices equipped with outdated firmware are subject to various …
Realswatt: Remote software-based attestation for embedded devices under realtime constraints
Smart factories, critical infrastructures, and medical devices largely rely on embedded
systems that need to satisfy realtime constraints to complete crucial tasks. Recent studies …
systems that need to satisfy realtime constraints to complete crucial tasks. Recent studies …
Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images
E Gustafson, P Grosen, N Redini, S Jha… - Proceedings of the 26th …, 2023 - dl.acm.org
In today's era of the Internet of Things, we are surrounded by security-and safety-critical,
network-connected devices. In parallel with the rise in attacks on such devices, we have also …
network-connected devices. In parallel with the rise in attacks on such devices, we have also …
{ICSPatch}: Automated Vulnerability Localization and {Non-Intrusive} Hotpatching in Industrial Control Systems using Data Dependence Graphs
The paradigm shift of enabling extensive intercommunication between the Operational
Technology (OT) and Information Technology (IT) devices allows vulnerabilities typical to the …
Technology (OT) and Information Technology (IT) devices allows vulnerabilities typical to the …
Save the Bruised Striver: A Reliable Live Patching Framework for Protecting Real-World PLCs
Industrial Control Systems (ICS), particularly programmable logic controllers (PLCs)
responsible for managing underlying physical infrastructures, often operate for extended …
responsible for managing underlying physical infrastructures, often operate for extended …
Perils and mitigation of security risks of cooperation in mobile-as-a-gateway iot
Mobile-as-a-Gateway (MaaG) is a popular feature using mobile devices as gateways to
connect IoT devices to cloud services for management. MaaG IoT access control systems …
connect IoT devices to cloud services for management. MaaG IoT access control systems …
[PDF][PDF] Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities
Embedded devices are increasingly ubiquitous in our society. Firmware updates are one of
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …
OPEC: operation-based security isolation for bare-metal embedded systems
Bare-metal embedded systems usually lack security isolation. Attackers can subvert the
whole system with a single vulnerability. Previous research intends to enforce both privilege …
whole system with a single vulnerability. Previous research intends to enforce both privilege …
Where's the" up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internetof-Things devices. Despite the widespread usage, there has been …
embedded and Internetof-Things devices. Despite the widespread usage, there has been …