作者
Pengfei Sun, Luis Garcia, Gabriel Salles-Loustau, Saman Zonouz
发表日期
2020/6/29
研讨会论文
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
页码范围
373-384
出版商
IEEE
简介
Mobile and IoT operating systems–and their ensuing software updates–are usually distributed as binary files. Given that these binary files are commonly closed source, users or businesses who want to assess the security of the software need to rely on reverse engineering. Further, verifying the correct application of the latest software patches in a given binary is an open problem. The regular application of software patches is a central pillar for improving mobile and IoT device security. This requires developers, integrators, and vendors to propagate patches to all affected devices in a timely and coordinated fashion. In practice, vendors follow different and sometimes improper security update agendas for both mobile and IoT products. Moreover, previous studies revealed the existence of a hidden patch gap: several vendors falsely reported that they patched vulnerabilities. Therefore, techniques to verify whether …
引用总数
学术搜索中的文章
P Sun, L Garcia, G Salles-Loustau, S Zonouz - 2020 50th annual IEEE/IFIP international conference …, 2020