With the advances in the field of the Internet of Things (IoT) and Industrial IoT (IIoT), these devices are increasingly used in daily life or industry. To reduce costs related to the time …
Fuzzing is one of the most effective approaches to finding software flaws. However, applying it to microcontroller firmware incurs many challenges. For example, rehosting-based …
L Cheng, K Tian, D Yao - Proceedings of the 33rd Annual Computer …, 2017 - dl.acm.org
Recent studies have revealed that control programs running on embedded devices suffer from both control-oriented attacks (eg, code-injection or code-reuse attacks) and data …
We propose a solution, MyTEE, that enables a trusted execution environment (TEE) to be built even in worstcase environments wherein major hardware security primitives (eg, ARM …
L Xue, H Zhou, X Luo, Y Zhou, Y Shi… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Malware authors are abusing packers (or runtime-based obfuscators) to protect malicious apps from being analyzed. Although many unpacking tools have been proposed, they can …
Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environments, to detecting insider threats …
Z Ning, F Zhang - 2019 IEEE Symposium on Security and …, 2019 - ieeexplore.ieee.org
Processors nowadays are consistently equipped with debugging features to facilitate the program analysis. Specifically, the ARM debugging architecture involves a series of …
More and more Android apps implement their functionalities in native code, so does malware. Although various approaches have been designed to analyze the native code …
ARM binary analysis has a wide range of applications in ARM system security. A fundamental challenge is ARM disassembly. ARM, particularly AArch32, has a number of …