Fuzzing has become one of the best-established methods to uncover software bugs. Meanwhile, the market of embedded systems, which binds the software execution tightly to …
M Dunne, K Schram… - 2024 IEEE 24th …, 2024 - ieeexplore.ieee.org
Modern firmware development is done in a fast-paced, time-constrained environment. This pressure tempts developers to use generative AI to write code for them to save time. While …
M Dunne, S Fischmeister - 2022 IEEE International Conference …, 2022 - ieeexplore.ieee.org
Modern cyber-physical systems require a thorough security evaluation before they are exposed to the public. Fuzzing is a conventional security analysis technique typically …
P Narimani, M Wang, U Planta, A Abbasi - arXiv preprint arXiv:2410.11563, 2024 - arxiv.org
Power side-channel (PSC) attacks are widely used in embedded microcontrollers, particularly in cryptographic applications, to extract sensitive information. However …
The growing complexity and size of hardware designs necessitates novel, scalable approaches to verification, as latent bugs and security flaws have devastating impact. This is …
RA Mantu, M Chiroiu, N Tăpus - 2023 24th International …, 2023 - ieeexplore.ieee.org
As fuzzing has seen increased interest not only in academia but also in industry settings, algorithmic advancements have become increasingly difficult to obtain. Moreover, the …
P Fuxen, M Hachani, J Schmidt… - CLOUD COMPUTING …, 2023 - researchgate.net
The current transformation in the automotive industry is leading to new technologies with a higher software content, a higher degree of networking, and connections to cloud services …
In the rapidly evolving landscape of the Internet of Things (IoT), the number of connected devices is growing exponentially. This growth is accompanied by an increasing demand to …
Since the discovery of the Stuxnet cyber attack that damaged several nuclear centrifuges in 2010, it has become evident that industrial control and automation systems are increasingly …