4.7 Article

Fuzzing of Embedded Systems: A Survey

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Challenges in Firmware Re-Hosting, Emulation, and Analysis

Christopher Wright et al.

Summary: System emulation and firmware re-hosting are popular techniques for addressing security and performance questions. However, starting work or research in this field can be difficult due to various challenges and the need for a comprehensive understanding of tools and methods.

ACM COMPUTING SURVEYS (2021)

Article Computer Science, Software Engineering

The Art, Science, and Engineering of Fuzzing: A Survey

Valentin J. M. Manes et al.

Summary: Fuzzing, a popular software testing technique, is valued for its simplicity, low deployment barrier, and empirical evidence in discovering vulnerabilities. However, the extensive efforts to improve fuzzing have made it challenging to gain a comprehensive understanding. This paper presents a unified fuzzing model and taxonomy to bring coherence to the vast literature on fuzzing.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2021)

Proceedings Paper Computer Science, Information Systems

SNIPUZZ: Black-box Fuzzing of IoT Firmware via Message Snippet Inference

Xiaotao Feng et al.

Summary: The proliferation of IoT devices has raised security concerns, leading to the need for efficient fuzzing approaches. Snipuzz, a novel automatic black-box fuzzing tool for IoT firmware, utilizes syntax inference to significantly reduce the search space for mutation. Compared to existing IoT fuzzing approaches, Snipuzz not only inherits advantages from app-based fuzzing but also effectively leverages communication responses to guide its mutation process, resulting in the discovery of zero-day vulnerabilities.

CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2021)

Article Computer Science, Information Systems

FIRM-COV: High-Coverage Greybox Fuzzing for IoT Firmware via Optimized Process Emulation

Juhwan Kim et al.

Summary: The study introduces FIRM-COV, a high coverage-oriented greybox fuzzer for IoT firmware, which tackles the issue of vulnerability detection in IoT devices through optimized emulation techniques and structured input generation. In testing, FIRM-COV outperformed other frameworks by achieving high coverage, throughput, and detection accuracy, finding multiple vulnerabilities within a short timeframe.

IEEE ACCESS (2021)

Review Computer Science, Hardware & Architecture

A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT

Jayasree Sengupta et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Proceedings Paper Computer Science, Information Systems

FIRMAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis

Mingeun Kim et al.

36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020) (2020)

Proceedings Paper Computer Science, Information Systems

PANGOLIN: Incremental Hybrid Fuzzing with Polyhedral Path Abstraction

Heqing Huang et al.

2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020) (2020)

Article Computer Science, Hardware & Architecture

EM-Fuzz: Augmented Firmware Fuzzing via Memory Checking

Jian Gao et al.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2020)

Article Computer Science, Information Systems

FIRMCORN: Vulnerability-Oriented Fuzzing of IoT Firmware via Optimized Virtual Execution

Zhijie Gui et al.

IEEE ACCESS (2020)

Article Computer Science, Software Engineering

Coverage-Based Greybox Fuzzing as Markov Chain

Marcel Bohme et al.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2019)

Article Computer Science, Hardware & Architecture

Polar: Function Code Aware Fuzz Testing of ICS Protocol

Zhengxiong Luo et al.

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS (2019)

Proceedings Paper Computer Science, Hardware & Architecture

An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis

Yaowen Zheng et al.

2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC) (2019)

Article Computer Science, Information Systems

Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo

Sandra Perez Arteaga et al.

IEEE ACCESS (2019)

Proceedings Paper Engineering, Electrical & Electronic

SeqFuzzer: An Industrial Protocol Fuzzing Framework from a Deep Learning Perspective

Hui Zhao et al.

2019 IEEE 12TH CONFERENCE ON SOFTWARE TESTING, VALIDATION AND VERIFICATION (ICST 2019) (2019)

Article Computer Science, Theory & Methods

A Survey of Symbolic Execution Techniques

Roberto Baldoni et al.

ACM COMPUTING SURVEYS (2018)

Article Computer Science, Interdisciplinary Applications

The industrial internet of things (IIoT): An analysis framework

Hugh Boyes et al.

COMPUTERS IN INDUSTRY (2018)

Article Computer Science, Hardware & Architecture

Fuzzing: State of the Art

Hongliang Liang et al.

IEEE TRANSACTIONS ON RELIABILITY (2018)

Article Computer Science, Information Systems

IIoT Cybersecurity Risk Modeling for SCADA Systems

Gregory Falco et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Proceedings Paper Computer Science, Theory & Methods

Hawkeye: Towards a Desired Directed Grey-box Fuzzer

Hongxu Chen et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Proceedings Paper Computer Science, Theory & Methods

Angora: Efficient Fuzzing by Principled Search

Peng Chen et al.

2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2018)

Article Computer Science, Information Systems

Fuzzing: a survey

Jun Li et al.

CYBERSECURITY (2018)

Proceedings Paper Computer Science, Information Systems

Directed Greybox Fuzzing

Marcel Bohme et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

FIRMUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution

Grant Hernandez et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Review Engineering, Electrical & Electronic

TinyOS-New Trends, Comparative Views, and Supported Sensing Applications: A Review

Muhammad Amjad et al.

IEEE SENSORS JOURNAL (2016)

Proceedings Paper Computer Science, Theory & Methods

LAVA: Large-scale Automated Vulnerability Addition

Brendan Dolan-Gavitt et al.

2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2016)

Proceedings Paper Computer Science, Information Systems

Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces

Andrei Costin et al.

ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Article Computer Science, Information Systems

The DARPA Cyber Grand Challenge: A Competitor's Perspective

Jia Song et al.

IEEE SECURITY & PRIVACY (2015)

Proceedings Paper Computer Science, Artificial Intelligence

A Survey of Dynamic Program Analysis Techniques and Tools

Anjana Gosain et al.

PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 1 (2015)

Article Automation & Control Systems

Internet of Things in Industries: A Survey

Li Da Xu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)

Article Computer Science, Information Systems

Introduction to Industrial Control Networks

Brendan Galloway et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Computer Science, Theory & Methods

The S2E Platform: Design, Implementation, and Applications

Vitaly Chipounov et al.

ACM TRANSACTIONS ON COMPUTER SYSTEMS (2012)

Article

Attacks and Defenses for JTAG

Kurt Rosenfeld et al.

IEEE DESIGN & TEST OF COMPUTERS (2010)

Article Computer Science, Hardware & Architecture

Hardware-software approaches to in-circuit emulation for embedded processors

Chung-Fu Kao et al.

IEEE DESIGN & TEST OF COMPUTERS (2008)

Article Computer Science, Hardware & Architecture

Discipline of embedded systems design

Thomas A. Henzinger et al.

COMPUTER (2007)

Article Computer Science, Software Engineering

Valgrind: A framework for heavyweight dynamic binary instrumentation

Nicholas Nethercote et al.

ACM SIGPLAN NOTICES (2007)

Article Computer Science, Software Engineering

The essence of command injection attacks in web applications

ZD Su et al.

ACM SIGPLAN NOTICES (2006)

Article Computer Science, Software Engineering

Pin: Building customized program analysis tools with dynamic instrumentation

CK Luk et al.

ACM SIGPLAN NOTICES (2005)

Article Computer Science, Hardware & Architecture

Simics:: A full system simulation platform

PS Magnusson et al.

COMPUTER (2002)