A taxonomy of IoT firmware security and principal firmware analysis techniques

I Nadir, H Mahmood, G Asadullah - International Journal of Critical …, 2022 - Elsevier
Abstract Internet of Things (IoT) has come a long way since its inception. However, the
standardization process in IoT systems for a secure IoT solution is still in its early days …

Llmif: Augmented large language model for fuzzing iot devices

J Wang, L Yu, X Luo - 2024 IEEE Symposium on Security and Privacy …, 2024 - computer.org
Despite the efficacy of fuzzing in verifying the implementation correctness of IoT protocols,
existing IoT fuzzing approaches grapple with several limitations, including unknown …

DeepDiffer: Find Deep Learning Compiler Bugs via Priority-guided Differential Fuzzing

K Lin, X Song, Y Zeng, S Guo - 2023 IEEE 23rd International …, 2023 - ieeexplore.ieee.org
Recently, Deep learning (DL) compilers have been widely developed to optimize the
deployment of DL models. These DL compilers transform DL models into high-level …

A Survey of Protocol Fuzzing

X Zhang, C Zhang, X Li, Z Du, Y Li, Y Zheng… - arXiv preprint arXiv …, 2024 - arxiv.org
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …

Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation.

C Zhang, Y Li, H Zhou, X Zhang, Y Zheng… - USENIX Security …, 2023 - usenix.org
Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation Page 1 Public Automata-Guided
Control-Flow-Sensitive Fuzz Driver Generation Cen Zhang, Yuekang Li, Hao Zhou, Xiaohan …

IoTAEG: Automatic Exploit Generation of IoT Devices

Y Wang, Z Li, Y Zhang, Y Zhai - 2023 4th International …, 2023 - ieeexplore.ieee.org
Automatic exploit generation (AEG) refers to the process of automatically finding the path in
the program that can trigger vulnerabilities and generate exploits. Generally speaking, the …

Fuzzing Self-Described Structures

K Abols - 2023 - search.proquest.com
Legacy formats are pervasive in digital spaces due to the need to read older data. Fuzzing
offers a way to proactively identify errors and vulnerabilities but can be computationally …

Learning program semantics via exploring program structures with deep learning

S Liu - 2022 - dr.ntu.edu.sg
The ubiquitousness of software in modern society and the boom in open-source software
have made software engineering into the “big code” era. The availability of code-related …

Android vulnerability detection

W Huang - 2022 - dr.ntu.edu.sg
Open-source Android application packages (APK) provide a huge base of applications for
users without the need to start creating the application from scratch. This gives the Android …