Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis 2022
DOI: 10.1145/3533767.3534414
|View full text |Cite
|
Sign up to set email alerts
|

Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
45
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(46 citation statements)
references
References 33 publications
0
45
0
1
Order By: Relevance
“…Examples of general-purpose embedded systems include Linux-based IoT devices and embedded Windows OS. Although many related studies [3,4,8,9] have focused on these systems because of their similarity with existing desktop programs, several challenges remain such as emulation instability and specific input generation for testing. Special-purpose embedded systems also have an OS.…”
Section: General-purpose Embedded Systems (Type-1)mentioning
confidence: 99%
See 3 more Smart Citations
“…Examples of general-purpose embedded systems include Linux-based IoT devices and embedded Windows OS. Although many related studies [3,4,8,9] have focused on these systems because of their similarity with existing desktop programs, several challenges remain such as emulation instability and specific input generation for testing. Special-purpose embedded systems also have an OS.…”
Section: General-purpose Embedded Systems (Type-1)mentioning
confidence: 99%
“…In addition, because considerable firmware is similar to existing software, traditional software testing techniques can be easily applied to the firmware inside the emulation environment. Thus, many emulation frameworks [3][4][5][6][7][8][9] have demonstrated their practicality by combining the fuzzing technique that is effective in finding unexpected vulnerabilities and is capable of automatic analysis. Therefore, we designed and implemented an emulation framework that combines fuzzing as a testing technique.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Vulnerability detection is an important yet far-from-settled issue. Including some conventional techniques such as static analysis [42][43][44][45], dynamic analysis [46][47][48][142][143][144][145][146][147] and symbolic execution [49,50], many advanced works have been made by applying machine learning-based approaches. In the early works [148][149][150], security experts usually hand-crafted features and took them as the input for machine learning algorithms for detection.…”
Section: Introductionmentioning
confidence: 99%