Demystify the fuzzing methods: A comprehensive survey

S Mallissery, YS Wu - ACM Computing Surveys, 2023 - dl.acm.org
Massive software applications possess complex data structures or parse complex data
structures; in such cases, vulnerabilities in the software become inevitable. The …

A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in iot/iiot devices, and their detection mechanisms

NF Polychronou, PH Thevenon, M Puys… - ACM Transactions on …, 2021 - dl.acm.org
With the advances in the field of the Internet of Things (IoT) and Industrial IoT (IIoT), these
devices are increasingly used in daily life or industry. To reduce costs related to the time …

μAFL: non-intrusive feedback-driven fuzzing for microcontroller firmware

W Li, J Shi, F Li, J Lin, W Wang, L Guan - Proceedings of the 44th …, 2022 - dl.acm.org
Fuzzing is one of the most effective approaches to finding software flaws. However, applying
it to microcontroller firmware incurs many challenges. For example, rehosting-based …

Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks

L Cheng, K Tian, D Yao - Proceedings of the 33rd Annual Computer …, 2017 - dl.acm.org
Recent studies have revealed that control programs running on embedded devices suffer
from both control-oriented attacks (eg, code-injection or code-reuse attacks) and data …

[PDF][PDF] MyTEE: Own the Trusted Execution Environment on Embedded Devices.

SK Han, J Jang - NDSS, 2023 - ndss-symposium.org
We propose a solution, MyTEE, that enables a trusted execution environment (TEE) to be
built even in worstcase environments wherein major hardware security primitives (eg, ARM …

Happer: Unpacking android apps via a hardware-assisted approach

L Xue, H Zhou, X Luo, Y Zhou, Y Shi… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Malware authors are abusing packers (or runtime-based obfuscators) to protect malicious
apps from being analyzed. Although many unpacking tools have been proposed, they can …

[图书][B] Anomaly detection as a service: challenges, advances, and opportunities

Anomaly detection has been a long-standing security approach with versatile applications,
ranging from securing server programs in critical environments, to detecting insider threats …

Understanding the security of arm debugging features

Z Ning, F Zhang - 2019 IEEE Symposium on Security and …, 2019 - ieeexplore.ieee.org
Processors nowadays are consistently equipped with debugging features to facilitate the
program analysis. Specifically, the ARM debugging architecture involves a series of …

NCScope: hardware-assisted analyzer for native code in Android apps

H Zhou, S Wu, X Luo, T Wang, Y Zhou… - Proceedings of the 31st …, 2022 - dl.acm.org
More and more Android apps implement their functionalities in native code, so does
malware. Although various approaches have been designed to analyze the native code …

D-arm: Disassembling arm binaries by lightweight superset instruction interpretation and graph modeling

Y Ye, Z Zhang, Q Shi, Y Aafer… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
ARM binary analysis has a wide range of applications in ARM system security. A
fundamental challenge is ARM disassembly. ARM, particularly AArch32, has a number of …