Research for Vulnerability Detection of Embedded System Firmware
نویسندگان
چکیده
منابع مشابه
Embedded Execution Environment for Modular Firmware Structures
The rising pressure of competition forces the industry to more flexible production. The ability of effective lot-size one and small batch production is becoming an important requisite for success on the todays competitive markets. However, classical manufacturing plants are not suited for the new requirements of todays markets. Decentralized systems helped to save money for cabling of the autom...
متن کاملEmbedded Firmware Diversity for Smart Electric Meters
Smart meters are now being aggressively deployed worldwide, with tens of millions of meters in use today and hundreds of millions more to be deployed in the next few years. These low-cost (' $50) embedded devices have not fared well under security analysis: experience has shown that the majority of current devices that have come under scrutiny can be exploited by unsophisticated attackers. The ...
متن کاملAutomotive Vulnerability Detection System
In [1] we presented a Vulnerability Detection System (VDS) that can detect emergent vulnerabilities in complex Cyber Physical Systems (CPSs). It used the attacker’s point of view by collecting a target system’s vulnerability information from varied sources and populating an Attack Point (AP) database. From these APs, a Hierarchical Task Network (HTN) generated the set of composite device-level ...
متن کاملMalicious Code Detection for Open Firmware
Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating system is loaded, it can easily circumvent any operating system-based security mechanism. Boot firmware programs are typically written by third-party device manufacturers and may come from various suppliers of unknown origin....
متن کاملTowards Automated Dynamic Analysis for Linux-based Embedded Firmware
Commercial-off-the-shelf (COTS) network-enabled embedded devices are usually controlled by vendor firmware to perform integral functions in our daily lives. For example, wireless home routers are often the first and only line of defense that separates a home user’s personal computing and information devices from the Internet. Such a vital and privileged position in the user’s network requires t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2017
ISSN: 1877-0509
DOI: 10.1016/j.procs.2017.03.181