BootStomp: On the Security of Bootloaders in Mobile Devices
暂无分享,去创建一个
Christopher Krügel | Yanick Fratantonio | Giovanni Vigna | Eric Gustafson | Dipanjan Das | Antonio Bianchi | Yan Shoshitaishvili | Aravind Machiry | Nilo Redini | Yan Shoshitaishvili | Christopher Krügel | Eric Gustafson | Antonio Bianchi | Aravind Machiry | Y. Fratantonio | Nilo Redini | Dipanjan Das | G. Vigna
[1] Larry Rudolph,et al. Thunderstrike: EFI firmware bootkits for Apple MacBooks , 2015, SYSTOR.
[2] Luca Bruno,et al. AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares , 2014, NDSS.
[3] Sencun Zhu,et al. STILL: Exploit Code Detection via Static Taint and Initialization Analyses , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[4] Jun Wang,et al. TaintPipe: Pipelined Symbolic Taint Analysis , 2015, USENIX Security Symposium.
[5] Mark R. Tuttle,et al. Symbolic Execution for BIOS Security , 2015, WOOT.
[6] Tao Wei,et al. IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution , 2009, NDSS.
[7] Christopher Krügel,et al. BareDroid: Large-Scale Analysis of Android Apps on Real Devices , 2015, ACSAC 2015.
[8] Dawson R. Engler,et al. Under-Constrained Symbolic Execution: Correctness Checking for Real Code , 2015, USENIX Annual Technical Conference.
[9] Christopher Krügel,et al. Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware , 2015, NDSS.
[10] Herbert Bos,et al. Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations , 2013, USENIX Security Symposium.
[11] David Brumley,et al. Unleashing Mayhem on Binary Code , 2012, 2012 IEEE Symposium on Security and Privacy.
[12] Christopher Krügel,et al. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[13] Dinghao Wu,et al. Reassembleable Disassembling , 2015, USENIX Security Symposium.
[14] Christopher Krügel,et al. Driller: Augmenting Fuzzing Through Selective Symbolic Execution , 2016, NDSS.
[15] Tadayoshi Kohno,et al. SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems , 2015, WOOT.
[16] Rafal Wojtczuk. Attacking UEFI Boot Script , 2015 .