Related references
Note: Only part of the references are listed.Challenges in Firmware Re-Hosting, Emulation, and Analysis
Christopher Wright et al.
ACM COMPUTING SURVEYS (2021)
The Art, Science, and Engineering of Fuzzing: A Survey
Valentin J. M. Manes et al.
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2021)
SNIPUZZ: Black-box Fuzzing of IoT Firmware via Message Snippet Inference
Xiaotao Feng et al.
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2021)
FIRM-COV: High-Coverage Greybox Fuzzing for IoT Firmware via Optimized Process Emulation
Juhwan Kim et al.
IEEE ACCESS (2021)
A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT
Jayasree Sengupta et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)
FIRMAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis
Mingeun Kim et al.
36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020) (2020)
PANGOLIN: Incremental Hybrid Fuzzing with Polyhedral Path Abstraction
Heqing Huang et al.
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020) (2020)
EM-Fuzz: Augmented Firmware Fuzzing via Memory Checking
Jian Gao et al.
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2020)
FIRMCORN: Vulnerability-Oriented Fuzzing of IoT Firmware via Optimized Virtual Execution
Zhijie Gui et al.
IEEE ACCESS (2020)
Coverage-Based Greybox Fuzzing as Markov Chain
Marcel Bohme et al.
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2019)
Polar: Function Code Aware Fuzz Testing of ICS Protocol
Zhengxiong Luo et al.
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS (2019)
An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis
Yaowen Zheng et al.
2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC) (2019)
Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo
Sandra Perez Arteaga et al.
IEEE ACCESS (2019)
SeqFuzzer: An Industrial Protocol Fuzzing Framework from a Deep Learning Perspective
Hui Zhao et al.
2019 IEEE 12TH CONFERENCE ON SOFTWARE TESTING, VALIDATION AND VERIFICATION (ICST 2019) (2019)
A Survey of Symbolic Execution Techniques
Roberto Baldoni et al.
ACM COMPUTING SURVEYS (2018)
The industrial internet of things (IIoT): An analysis framework
Hugh Boyes et al.
COMPUTERS IN INDUSTRY (2018)
Fuzzing: State of the Art
Hongliang Liang et al.
IEEE TRANSACTIONS ON RELIABILITY (2018)
IIoT Cybersecurity Risk Modeling for SCADA Systems
Gregory Falco et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
Hawkeye: Towards a Desired Directed Grey-box Fuzzer
Hongxu Chen et al.
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)
Angora: Efficient Fuzzing by Principled Search
Peng Chen et al.
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2018)
Directed Greybox Fuzzing
Marcel Bohme et al.
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)
FIRMUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution
Grant Hernandez et al.
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)
TinyOS-New Trends, Comparative Views, and Supported Sensing Applications: A Review
Muhammad Amjad et al.
IEEE SENSORS JOURNAL (2016)
LAVA: Large-scale Automated Vulnerability Addition
Brendan Dolan-Gavitt et al.
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2016)
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
Andrei Costin et al.
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)
The DARPA Cyber Grand Challenge: A Competitor's Perspective
Jia Song et al.
IEEE SECURITY & PRIVACY (2015)
A Survey of Dynamic Program Analysis Techniques and Tools
Anjana Gosain et al.
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 1 (2015)
Internet of Things in Industries: A Survey
Li Da Xu et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)
Introduction to Industrial Control Networks
Brendan Galloway et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)
The S2E Platform: Design, Implementation, and Applications
Vitaly Chipounov et al.
ACM TRANSACTIONS ON COMPUTER SYSTEMS (2012)
Hardware-software approaches to in-circuit emulation for embedded processors
Chung-Fu Kao et al.
IEEE DESIGN & TEST OF COMPUTERS (2008)
Discipline of embedded systems design
Thomas A. Henzinger et al.
COMPUTER (2007)
Valgrind: A framework for heavyweight dynamic binary instrumentation
Nicholas Nethercote et al.
ACM SIGPLAN NOTICES (2007)
The essence of command injection attacks in web applications
ZD Su et al.
ACM SIGPLAN NOTICES (2006)
Pin: Building customized program analysis tools with dynamic instrumentation
CK Luk et al.
ACM SIGPLAN NOTICES (2005)
Simics:: A full system simulation platform
PS Magnusson et al.
COMPUTER (2002)