4.7 Article

Fuzzing of Embedded Systems: A Survey

期刊

ACM COMPUTING SURVEYS
卷 55, 期 7, 页码 -

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3538644

关键词

Firmware fuzzing; IoT devices; firmware analysis; fuzzing; embedded systems; software testing; symbolic execution; concolic execution

向作者/读者索取更多资源

Security attacks exploit software vulnerabilities in IoT devices, so it is essential to detect and eliminate these vulnerabilities promptly. Fuzzing is an effective automated method for identifying vulnerabilities, and there have been numerous publications on the topic. However, there is limited research on fuzzing for embedded systems due to obstacles like multi-architecture support, crash detection challenges, and resource constraints. This article introduces fuzzing techniques for embedded systems, compares them to desktop systems, discusses the pros and cons of state-of-the-art technologies, and classifies embedded system fuzzing tools. It also predicts and discusses future directions for fuzzing research in embedded systems.
Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to identify vulnerabilities automatically, and many publications have been released to date. However, fuzzing for embedded systems has not been studied extensively owing to various obstacles, such as multi-architecture support, crash detection difficulties, and limited resources. Thus, the article introduces fuzzing techniques for embedded systems and the fuzzing differences for desktop and embedded systems. Further, we collect state-of-the-art technologies, discuss their advantages and disadvantages, and classify embedded system fuzzing tools. Finally, future directions for fuzzing research of embedded systems are predicted and discussed.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据