2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS) 2017
DOI: 10.1109/icpads.2017.00104
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Detection in IoT Firmware: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(23 citation statements)
references
References 4 publications
0
22
0
1
Order By: Relevance
“…The most common reverse engineering techniques employed for IoT security analysis rely on network packets inspection or on more complex analysis of device firmware images. Several methodologies have been proposed in recent years to automate the analysis of device firmware, leveraging on techniques such as formal methods, fuzzing, static analysis and signature matching [13,14,27,29]. Recently, in addition to the analysis of firmware images, the automatic inspection of companion applications also proved to be an effective strategy [19,26].…”
Section: Esp-touch: Methodology Of Analysismentioning
confidence: 99%
“…The most common reverse engineering techniques employed for IoT security analysis rely on network packets inspection or on more complex analysis of device firmware images. Several methodologies have been proposed in recent years to automate the analysis of device firmware, leveraging on techniques such as formal methods, fuzzing, static analysis and signature matching [13,14,27,29]. Recently, in addition to the analysis of firmware images, the automatic inspection of companion applications also proved to be an effective strategy [19,26].…”
Section: Esp-touch: Methodology Of Analysismentioning
confidence: 99%
“…There are several studies that have been dedicated to vulnerabilities in M-IoT and can be followed from [85]- [92]. Based on these, it becomes inevitably important to understand the concept, issues, scope and strength of the present state of security, privacy and trust for smart M-IoT.…”
Section: Vulnerabilities In Smart M-iotmentioning
confidence: 99%
“…content using a flash programmer tool. This allows the attacker to dump the existing firmware [9][10] as well as update it. The attacker will need physical access to the device in order to exploit the vulnerability.…”
Section: Universal Serial Bus (Usb)mentioning
confidence: 99%