2021
DOI: 10.1145/3432893
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Vulnerability Detection in Embedded Devices and Firmware

Abstract: In the era of the internet of things (IoT), software-enabled inter-connected devices are of paramount importance. The embedded systems are very frequently used in both security and privacy-sensitive applications. However, the underlying software (a.k.a. firmware) very often suffers from a wide range of security vulnerabilities, mainly due to their outdated systems or reusing existing vulnerable libraries; which is evident by the surprising rise in the number of attacks against embedded systems. Therefore, to p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(17 citation statements)
references
References 121 publications
0
13
0
Order By: Relevance
“…Ultrasonic data acquisition refers to the analysis of the source code or binary code of the program without running the program [16][17][18]. rough ultrasonic data acquisition, a clear framework understanding of the program can be realized, and the combination of dynamic and static is realized according to the corresponding ultrasonic data acquisition, focusing on solving the problem of false alarm rate [19,20].…”
Section: Binary Program Ultrasonic Data Acquisitionmentioning
confidence: 99%
“…Ultrasonic data acquisition refers to the analysis of the source code or binary code of the program without running the program [16][17][18]. rough ultrasonic data acquisition, a clear framework understanding of the program can be realized, and the combination of dynamic and static is realized according to the corresponding ultrasonic data acquisition, focusing on solving the problem of false alarm rate [19,20].…”
Section: Binary Program Ultrasonic Data Acquisitionmentioning
confidence: 99%
“…Furthermore, our goal was to investigate underexplored research questions in the field by conducting a series of rigorous experiments. For a complete survey, we refer readers to the recent surveys on BCSA [152], [153].…”
Section: Discussionmentioning
confidence: 99%
“…Various aspects regarding the analysis of firmware binaries and configuration security have been explored in previous studies. While it may seem like most aspects of firmware analysis have already been covered by previous studies, most such studies have focused on Linux-based systems [64]. We observe that the analysis of stripped binaries targeting nontraditional operating systems and the ARM Thumb instruction set, which is increasingly favoured by IoT peripherals and which is the focus of our analysis, has still not been explored sufficiently.…”
Section: Related Workmentioning
confidence: 96%