HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation
暂无分享,去创建一个
Giovanni Vigna | Saurabh Bagchi | Mathias Payer | Christopher Kruegel | Abraham A. Clements | Eric Gustafson | Tobias Scharnowski | Paul Grosen | David Fritz | C. Kruegel | Mathias Payer | S. Bagchi | Eric Gustafson | Tobias Scharnowski | G. Vigna | Paul Grosen | David J. Fritz
[1] Christopher Krügel,et al. Toward the Analysis of Embedded Firmware through Automated Re-hosting , 2019, RAID.
[2] Thomas C. Schmidt,et al. RIOT: An Open Source Operating System for Low-End Embedded Devices in the IoT , 2018, IEEE Internet of Things Journal.
[3] Adam Dunkels,et al. Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[4] Lingyu Wang,et al. FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries , 2018, ACM Trans. Priv. Secur..
[5] Tadayoshi Kohno,et al. SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems , 2015, WOOT.
[6] Michail Maniatakos,et al. The Cybersecurity Landscape in Industrial Control Systems , 2016, Proceedings of the IEEE.
[7] Xiaohong Su,et al. Using Reduced Execution Flow Graph to Identify Library Functions in Binary Code , 2016, IEEE Transactions on Software Engineering.
[8] Christopher Krügel,et al. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[9] Derek Bruening,et al. AddressSanitizer: A Fast Address Sanity Checker , 2012, USENIX Annual Technical Conference.
[10] Patrick Th. Eugster,et al. TARDIS: software-only system-level record and replay in wireless sensor networks , 2015, IPSN '15.
[11] Xiaohong Su,et al. Library functions identification in binary code by using graph isomorphism testings , 2015, 2015 IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER).
[12] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[13] Adam Dunkels,et al. Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[14] Aurélien Francillon,et al. Avatar2: A Multi-Target Orchestration Platform , 2018 .
[15] Barton P. Miller,et al. Labeling library functions in stripped binaries , 2011, PASTE '11.
[16] David Brumley,et al. Towards Automated Dynamic Analysis for Linux-based Embedded Firmware , 2016, NDSS.
[17] Petar Tsankov,et al. Debin: Predicting Debug Information in Stripped Binaries , 2018, CCS.
[18] Thomas Dullien,et al. Graph-based comparison of Executable Objects , 2005 .
[19] Aurélien Francillon,et al. What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices , 2018, NDSS.
[20] Long Lu,et al. P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling (extended version) , 2019, USENIX Security Symposium.
[21] Halvar Flake,et al. Structural Comparison of Executable Objects , 2004, DIMVA.
[22] Brendan Dolan-Gavitt,et al. Repeatable Reverse Engineering with PANDA , 2015, PPREW@ACSAC.
[23] Luca Bruno,et al. AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares , 2014, NDSS.
[24] Apostolis Zarras,et al. Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces , 2015, AsiaCCS.
[25] Fredrik Larsson,et al. Simics: A Full System Simulation Platform , 2002, Computer.