Page cover

附录6: 论文

[1] SoK: Enabling Security Analyses of Embedded Systems via Rehostingarrow-up-right

[2] Towards Automated Dynamic Analysis for Linux-based Embedded Firmwarearrow-up-right

[3] FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysisarrow-up-right

[4] FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulationarrow-up-right

[5] FirmFuzz: Automated IoT Firmware Introspection and Analysisarrow-up-right

[6] Avatar: A Framework to Support Dynamic Security Analysis of EmbeddedSystems’ Firmwaresarrow-up-right

[7] Avatar2: A Multi-target Orchestration Platformarrow-up-right

[8] Jetset: Targeted Firmware Rehosting for Embedded Systemsarrow-up-right

[9] HALucinator: Firmware Re-hostingThrough Abstraction Layer Emulationarrow-up-right

[10] P²IM: Scalable and Hardware-independent Firmware Testing viaAutomatic Peripheral Interface Modelingarrow-up-right

[11] DICE: Automatic Emulation of DMA InputChannels for Dynamic Firmware Analysisarrow-up-right

[12] From Library Portability to Para-rehosting:Natively Executing Microcontroller Softwareon Commodity Hardwarearrow-up-right

[13] FIRMWIRE: Transparent Dynamic Analysis for Cellular Baseband Firmwarearrow-up-right

[14] Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzingarrow-up-right

[15] PeriScope: An Effective Probing and FuzzingFramework for the Hardware-OS Boundaryarrow-up-right

[16] Toward the Analysis of Embedded Firmware through Automated Re-hostingarrow-up-right

[17] Device-agnostic Firmware Execution is Possible: A ConcolicExecution Approach for Peripheral Emulationarrow-up-right

[18] Automatic Firmware Emulation through Invalidity-guided Knowledge Inferencearrow-up-right

[19] Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targetsarrow-up-right

[20] Hybrid Firmware Analysis for KnownMobile and IoT Security Vulnerabilitiesarrow-up-right

[21] KARONTE: Detecting InsecureMulti-binary Interactions in Embedded Firmwarearrow-up-right

[22] Sharing More and Checking Less:Leveraging Common Input Keywords to Detect Bugs in Embedded Systemsarrow-up-right

[23] Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmwarearrow-up-right

[24] FIE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Executionarrow-up-right

[25] PASAN: Detecting Peripheral Access Concurrency Bugs with Bare-Metal Embedded Applicationsarrow-up-right

[26] BASESPEC: Comparative Analysis of BasebandSoftware and Cellular Specifications for L3 Protocolsarrow-up-right

[27] LightBLue: Automatic Profile-Aware Debloating of Bluetooth Stacksarrow-up-right

[28] FirmXRay: Detecting Bluetooth Link Layer VulnerabilitiesFrom Bare-Metal Firmwarearrow-up-right

[29] 嵌入式设备固件安全分析技术研究综述arrow-up-right

[30] A Large-Scale Analysis of the Security of Embedded Firmwaresarrow-up-right

[31] 基于同源性分析的嵌入式设备固件漏洞检测arrow-up-right

[32] Cross-Architecture Bug Search in Binary Executablesarrow-up-right

[33] discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Codearrow-up-right

[34] VDNS:一种跨平台的固件漏洞关联算法arrow-up-right

[35] BinArm: Scalable and Ecient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devicesarrow-up-right

[36] FirmUp: Precise Static Detection of Common Vulnerabilities in Firmwarearrow-up-right

[37] Scalable Graph-based Bug Search for Firmware Imagesarrow-up-right

[38] Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detectionarrow-up-right

[39] Semantic Learning Based Cross-Platform Binary Vulnerability Search For IoT Devicesarrow-up-right

[40] VulSeeker: A Semantic Learning Based Vulnerability Seeker for Cross-Platform Binaryarrow-up-right

[41] VulSeeker-Pro: Enhanced Semantic Learning Based Binary Vulnerability Seeker with Emulationarrow-up-right

[42] Extracting Conditional Formulas for Cross-Platform Bug Searcharrow-up-right

[43] 物联网固件安全缺陷检测研究进展arrow-up-right

[44] 物联网设备漏洞挖掘技术研究综述arrow-up-right

Last updated