2019
DOI: 10.1109/tse.2019.2939526
|View full text |Cite
|
Sign up to set email alerts
|

ProXray: Protocol Model Learning and Guided Firmware Analysis

Abstract: The number of Internet of Things (IoT) has reached 7 billion globally in early 2018 and are nearly ubiquitous in daily life. Knowing whether or not these devices are safe and secure to use is becoming critical. IoT devices usually implement communication protocols such as USB and Bluetooth within firmware to allow a wide range of functionality. Thus analyzing firmware using domain knowledge from these protocols is vital to understand device behavior, detect implementation bugs, and identify malicious component… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 45 publications
0
2
0
Order By: Relevance
“…However, unlike in these works, we consider systems in which samples of correct usage of the functions and features may not be available. Our use of symbolic constraints in learning differs from the approach in [27] as our constraints are not on the input variables and, instead, involve internal state of the computation, which is important for detecting unwanted feature interactions.…”
Section: Related Workmentioning
confidence: 99%
“…However, unlike in these works, we consider systems in which samples of correct usage of the functions and features may not be available. Our use of symbolic constraints in learning differs from the approach in [27] as our constraints are not on the input variables and, instead, involve internal state of the computation, which is important for detecting unwanted feature interactions.…”
Section: Related Workmentioning
confidence: 99%
“…However, unlike in these works, we consider systems in which samples of correct usage of the functions and features may not be available. Our use of symbolic constraints in learning differs from the approach in Fowze et al (2019) as our constraints are not on the input variables, and instead, the involve internal state of the computation, which is important for detecting unwanted feature interactions.…”
Section: Related Workmentioning
confidence: 99%