Demystify the fuzzing methods: A comprehensive survey

S Mallissery, YS Wu - ACM Computing Surveys, 2023 - dl.acm.org
Massive software applications possess complex data structures or parse complex data
structures; in such cases, vulnerabilities in the software become inevitable. The …

A taxonomy of IoT firmware security and principal firmware analysis techniques

I Nadir, H Mahmood, G Asadullah - International Journal of Critical …, 2022 - Elsevier
Abstract Internet of Things (IoT) has come a long way since its inception. However, the
standardization process in IoT systems for a secure IoT solution is still in its early days …

Detecting vulnerability on IoT device firmware: A survey

X Feng, X Zhu, QL Han, W Zhou… - IEEE/CAA Journal of …, 2022 - ieeexplore.ieee.org
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …

Fuzzware: Using precise {MMIO} modeling for effective firmware fuzzing

T Scharnowski, N Bars, M Schloegel… - 31st USENIX Security …, 2022 - usenix.org
As embedded devices are becoming more pervasive in our everyday lives, they turn into an
attractive target for adversaries. Despite their high value and large attack surface, applying …

Automatic firmware emulation through invalidity-guided knowledge inference

W Zhou, L Guan, P Liu, Y Zhang - 30th USENIX Security Symposium …, 2021 - usenix.org
Emulating firmware for microcontrollers is challenging due to the tight coupling between the
hardware and firmware. This has greatly impeded the application of dynamic analysis tools …

Sok: Enabling security analyses of embedded systems via rehosting

A Fasano, T Ballo, M Muench, T Leek… - Proceedings of the …, 2021 - dl.acm.org
Closely monitoring the behavior of a software system during its execution enables
developers and analysts to observe, and ultimately understand, how it works. This kind of …

μAFL: non-intrusive feedback-driven fuzzing for microcontroller firmware

W Li, J Shi, F Li, J Lin, W Wang, L Guan - Proceedings of the 44th …, 2022 - dl.acm.org
Fuzzing is one of the most effective approaches to finding software flaws. However, applying
it to microcontroller firmware incurs many challenges. For example, rehosting-based …

Greenhouse:{Single-Service} Rehosting of {Linux-Based} Firmware Binaries in {User-Space} Emulation

HJ Tay, K Zeng, JM Vadayath, AS Raj… - 32nd USENIX Security …, 2023 - usenix.org
As IoT devices grow more widespread, scaling current analysis techniques to match
becomes an increasingly critical task. Part of this challenge involves not only rehosting the …

Harnessing the power of llm to support binary taint analysis

P Liu, C Sun, Y Zheng, X Feng, C Qin, Y Wang… - arXiv preprint arXiv …, 2023 - arxiv.org
This paper proposes LATTE, the first static binary taint analysis that is powered by a large
language model (LLM). LATTE is superior to the state of the art (eg, Emtaint, Arbiter …

[HTML][HTML] Embedded fuzzing: a review of challenges, tools, and solutions

M Eisele, M Maugeri, R Shriwas, C Huth, G Bella - Cybersecurity, 2022 - Springer
Fuzzing has become one of the best-established methods to uncover software bugs.
Meanwhile, the market of embedded systems, which binds the software execution tightly to …