Fuzzing of embedded systems: A survey

J Yun, F Rustamov, J Kim, Y Shin - ACM Computing Surveys, 2022 - dl.acm.org
Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …

Challenges in firmware re-hosting, emulation, and analysis

C Wright, WA Moeglein, S Bagchi, M Kulkarni… - ACM Computing …, 2021 - dl.acm.org
System emulation and firmware re-hosting have become popular techniques to answer
various security and performance related questions, such as determining whether a …

Detecting vulnerability on IoT device firmware: A survey

X Feng, X Zhu, QL Han, W Zhou… - IEEE/CAA Journal of …, 2022 - ieeexplore.ieee.org
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …

Snipuzz: Black-box fuzzing of iot firmware via message snippet inference

X Feng, R Sun, X Zhu, M Xue, S Wen, D Liu… - Proceedings of the …, 2021 - dl.acm.org
The proliferation of Internet of Things (IoT) devices has made people's lives more
convenient, but it has also raised many security concerns. Due to the difficulty of obtaining …

Firmae: Towards large-scale emulation of iot firmware for dynamic analysis

M Kim, D Kim, E Kim, S Kim, Y Jang, Y Kim - Proceedings of the 36th …, 2020 - dl.acm.org
One approach to assess the security of embedded IoT devices is applying dynamic analysis
such as fuzz testing to their firmware in scale. To this end, existing approaches aim to …

{HALucinator}: Firmware re-hosting through abstraction layer emulation

AA Clements, E Gustafson, T Scharnowski… - 29th USENIX Security …, 2020 - usenix.org
Given the increasing ubiquity of online embedded devices, analyzing their firmware is
important to security, privacy, and safety. The tight coupling between hardware and firmware …

Automatic firmware emulation through invalidity-guided knowledge inference

W Zhou, L Guan, P Liu, Y Zhang - 30th USENIX Security Symposium …, 2021 - usenix.org
Emulating firmware for microcontrollers is challenging due to the tight coupling between the
hardware and firmware. This has greatly impeded the application of dynamic analysis tools …

Jetset: Targeted firmware rehosting for embedded systems

E Johnson, M Bland, YF Zhu, J Mason… - 30th USENIX Security …, 2021 - usenix.org
The ability to execute code in an emulator is a fundamental part of modern vulnerability
testing. Unfortunately, this poses a challenge for many embedded systems, where firmware …

SymQEMU: Compilation-based symbolic execution for binaries

S Poeplau, A Francillon - NDSS 2021, Network and Distributed System …, 2021 - hal.science
Symbolic execution is a powerful technique for software analysis and bug detection.
Compilation-based symbolic execution is a recently proposed flavor that has been shown to …

Diane: Identifying fuzzing triggers in apps to generate under-constrained inputs for iot devices

N Redini, A Continella, D Das… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices have rooted themselves in the everyday life of billions of
people. Thus, researchers have applied automated bug finding techniques to improve their …