The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security 2021
DOI: 10.1145/3433210.3453093
|View full text |Cite
|
Sign up to set email alerts
|

SoK: Enabling Security Analyses of Embedded Systems via Rehosting

Abstract: Closely monitoring the behavior of a software system during its execution enables developers and analysts to observe, and ultimately understand, how it works. This kind of dynamic analysis can be instrumental to reverse engineering, vulnerability discovery, exploit development, and debugging. While these analyses are typically wellsupported for homogeneous desktop platforms (e.g., x86 desktop PCs), they can rarely be applied in the heterogeneous world of embedded systems. One approach to enable dynamic analyse… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(21 citation statements)
references
References 62 publications
0
8
0
Order By: Relevance
“…In Table 2 (Appendix E), we provide a feature, architecture, and analysis-support comparison of MetaEmu with the state-of-the-art, using the framework classification proposed by Fasano [16]. The key difference between MetaEmu and the frameworks listed, is that our approach generically enables analysis of firmware not currently supported by other frameworks with little effort.…”
Section: Discussion and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In Table 2 (Appendix E), we provide a feature, architecture, and analysis-support comparison of MetaEmu with the state-of-the-art, using the framework classification proposed by Fasano [16]. The key difference between MetaEmu and the frameworks listed, is that our approach generically enables analysis of firmware not currently supported by other frameworks with little effort.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…As highlighted by Fasano et al [16], rehosting is an iterative process that requires human intervention and debugging. To that end, we integrate MetaEmu with widely used binary analysis and reverseengineering tools, to reduce the manual effort involved.…”
Section: Integration With External Toolsmentioning
confidence: 99%
See 1 more Smart Citation
“…Detailed summaries of the challenges of fuzzing embedded systems ) and security analysis of embedded systems (Fasano et al 2021;Wright et al 2021) have been published. However, these reviews do concentrate almost solely on emulation-based approaches.…”
Section: Related Workmentioning
confidence: 99%
“…At the time of writing, most published work has sought to address the former challenge: peripheral support. However, as noted by Fasano et al [17] in their systematization of the field, for devices whose firmware is not supported by an off-the-shelf emulator, the latter challenge-obtaining a suitable execution environment-remains an open problem, hampering the analysis of a large and vital class of devices.…”
Section: Introductionmentioning
confidence: 99%