Survey on automated vulnerability mining techniques for IoT device firmware

With the wide application of IoT technology, IoT devices have exploded. In recent years, security incidents caused by IoT devices have occurred frequently, which makes the research of IoT device security become a hot spot. The security analysis of IoT device firmware has been conducted, with a focus...

Full description

Saved in:
Bibliographic Details
Main Authors: LIU Hangtian, GAN Shuitao, ZHANG Chao, ZHANG Hongqi, SUN Wenhou, GAO Zicong, ZHAO Min, BAI Xue
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2025-04-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2025014
Tags: Add Tag
No Tags, Be the first to tag this record!