Toward the Analysis of Embedded Firmware through Automated Re-hosting
暂无分享,去创建一个
Christopher Krügel | Yanick Fratantonio | Giovanni Vigna | Aurélien Francillon | Davide Balzarotti | Yung Ryn Choe | Eric Gustafson | Aravind Machiry | Nilo Redini | Chad Spensky | Marius Muench | Christopher Krügel | Giovanni Vigna | Aurélien Francillon | D. Balzarotti | Eric Gustafson | Aravind Machiry | Y. Fratantonio | Marius Muench | Chad Spensky | Nilo Redini | G. Vigna
[1] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[2] Fredrik Larsson,et al. Simics: A Full System Simulation Platform , 2002, Computer.
[3] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[4] George Candea,et al. S2E: a platform for in-vivo multi-path analysis of software systems , 2011, ASPLOS XVI.
[5] Tim Wilmshurst,et al. Fast and Effective Embedded Systems Design: Applying the ARM mbed , 2012 .
[6] Somesh Jha,et al. FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution , 2013, USENIX Security Symposium.
[7] Wolfgang Kastner,et al. Prospect: peripheral proxying supported embedded code testing , 2014, AsiaCCS.
[8] Luca Bruno,et al. AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares , 2014, NDSS.
[9] Brendan Dolan-Gavitt,et al. Repeatable Reverse Engineering with PANDA , 2015, PPREW@ACSAC.
[10] Tadayoshi Kohno,et al. SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems , 2015, WOOT.
[11] Christopher Krügel,et al. Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware , 2015, NDSS.
[12] Apostolis Zarras,et al. Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces , 2015, AsiaCCS.
[13] David Brumley,et al. Towards Automated Dynamic Analysis for Linux-based Embedded Firmware , 2016, NDSS.
[14] Wolfgang Kastner,et al. Embedded Security Testing with Peripheral Device Caching and Runtime Program State Approximation , 2016, SECURWARE 2016.
[15] Christopher Krügel,et al. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[16] Farhaan Fowze,et al. FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution , 2017, CCS.
[17] Christopher Krügel,et al. DIFUZE: Interface Aware Fuzzing for Kernel Drivers , 2017, CCS.
[18] Aurélien Francillon,et al. What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices , 2018, NDSS.
[19] Aurélien Francillon,et al. Inception: System-Wide Security Testing of Real-World Embedded Systems Software , 2018, USENIX Security Symposium.
[20] Aurélien Francillon,et al. Avatar2: A Multi-Target Orchestration Platform , 2018 .