Survey on automated vulnerability mining techniques for IoT device firmware
With the wide application of IoT technology, IoT devices have exploded. In recent years, security incidents caused by IoT devices have occurred frequently, which makes the research of IoT device security become a hot spot. The security analysis of IoT device firmware has been conducted, with a focus...
Saved in:
| Main Authors: | LIU Hangtian, GAN Shuitao, ZHANG Chao, ZHANG Hongqi, SUN Wenhou, GAO Zicong, ZHAO Min, BAI Xue |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2025-04-01
|
| Series: | 网络与信息安全学报 |
| Subjects: | |
| Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2025014 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Bare-Metal Firmware Fuzzing: A Survey of Techniques and Approaches
by: Asmita Asmita, et al.
Published: (2025-01-01) -
Simulations of tungsten fuzz growth and erosion under He/Ar mixed plasma irradiation on LP-MIES
by: K.R. Yang, et al.
Published: (2024-12-01) -
CBGF: Callback Coverage Guided Fuzzing
by: Ho Hwang, et al.
Published: (2025-01-01) -
Framework to analyze and exploit the smart home IoT firmware
by: Keshav Kaushik, et al.
Published: (2025-02-01) -
RIMFuzz: real-time impact-aware mutation for library API fuzzing
by: Xiaoke Wang, et al.
Published: (2025-06-01)